CVE-2016-1523
Published on: 02/12/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:05 PM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
- CVE-2016-1523 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Debian -- Security Information -- DSA-3477-1 iceweasel | www.debian.org Depreciated Link text/html | DEBIAN DSA-3477 |
[security-announce] SUSE-SU-2016:0779-1: important: Security update for | lists.opensuse.org text/html | SUSE SUSE-SU-2016:0779 |
Mozilla Firefox libgraphite Font Processing Flaw Lets Remote Users Execute Arbitrary Code - SecurityTracker | www.securitytracker.com text/html | SECTRACK 1035017 |
[SECURITY] Fedora 22 Update: graphite2-1.3.6-1.fc22 | Third Party Advisory lists.fedoraproject.org text/html | FEDORA FEDORA-2016-338a7e9925 |
Vulnerabilities in Graphite 2 — Mozilla | Patch Vendor Advisory www.mozilla.org text/html | CONFIRM www.mozilla.org/security/announce/2016/mfsa2016-14.html |
Red Hat Customer Portal | web.archive.org text/html Inactive LinkNot Archived | REDHAT RHSA-2016:0197 |
[security-announce] openSUSE-SU-2016:0791-1: important: Security update | lists.opensuse.org text/html | SUSE openSUSE-SU-2016:0791 |
[security-announce] openSUSE-SU-2016:0875-1: important: Security update | lists.opensuse.org text/html | SUSE openSUSE-SU-2016:0875 |
USN-2904-1: Thunderbird vulnerabilities | Ubuntu | www.ubuntu.com text/html | UBUNTU USN-2904-1 |
Mozilla Products: Multiple vulnerabilities (GLSA 201605-06) — Gentoo security | security.gentoo.org text/html | GENTOO GLSA-201605-06 |
[security-announce] SUSE-SU-2016:0554-1: important: Security update for | lists.opensuse.org text/html | SUSE SUSE-SU-2016:0554 |
[security-announce] SUSE-SU-2016:0564-1: important: Security update for | lists.opensuse.org text/html | SUSE SUSE-SU-2016:0564 |
Oracle Linux Bulletin - April 2016 | www.oracle.com text/html | CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html |
Graphite: Multiple vulnerabilities (GLSA 201701-63) — Gentoo Security | security.gentoo.org text/html | GENTOO GLSA-201701-63 |
Mozilla SeaMonkey: Multiple vulnerabilities (GLSA 201701-35) — Gentoo security | security.gentoo.org text/html | GENTOO GLSA-201701-35 |
[SECURITY] Fedora 23 Update: graphite2-1.3.5-1.fc23 | Third Party Advisory lists.fedoraproject.org text/html | FEDORA FEDORA-2016-4154a4d0ba |
Libgraphite Multiple Security Vulnerabilities | cve.report (archive) text/html | BID 82991 |
Oracle Linux Bulletin - January 2016 | www.oracle.com text/html | CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html |
Red Hat Customer Portal | web.archive.org text/html Inactive LinkNot Archived | REDHAT RHSA-2016:0594 |
Access Denied | Issue Tracking bugzilla.mozilla.org text/html | CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1246093 |
USN-2902-1: graphite2 vulnerabilities | Ubuntu | www.ubuntu.com text/html | UBUNTU USN-2902-1 |
Cisco's Talos Intelligence Group Blog: Vulnerability Spotlight: Libgraphite Font Processing Vulnerabilities | blog.talosintel.com text/html | MISC blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html |
Debian -- Security Information -- DSA-3479-1 graphite2 | Third Party Advisory www.debian.org Depreciated Link text/html | DEBIAN DSA-3479 |
Red Hat Customer Portal | web.archive.org text/html Inactive LinkNot Archived | REDHAT RHSA-2016:0258 |
Debian -- Security Information -- DSA-3491-1 icedove | www.debian.org Depreciated Link text/html | DEBIAN DSA-3491 |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 7.0 | All | All | All |
Operating System | Debian | Debian Linux | 8.0 | All | All | All |
Operating System | Debian | Debian Linux | 7.0 | All | All | All |
Operating System | Debian | Debian Linux | 8.0 | All | All | All |
Operating System | Fedoraproject | Fedora | 22 | All | All | All |
Operating System | Fedoraproject | Fedora | 23 | All | All | All |
Operating System | Fedoraproject | Fedora | 22 | All | All | All |
Operating System | Fedoraproject | Fedora | 23 | All | All | All |
Application | Mozilla | Firefox Esr | 38.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.0.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.0.5 | All | All | All |
Application | Mozilla | Firefox Esr | 38.1.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.1.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.2.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.2.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.3.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.4.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.5.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.5.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.5.2 | All | All | All |
Application | Mozilla | Firefox Esr | 38.6.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.0.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.0.5 | All | All | All |
Application | Mozilla | Firefox Esr | 38.1.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.1.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.2.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.2.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.3.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.4.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.5.0 | All | All | All |
Application | Mozilla | Firefox Esr | 38.5.1 | All | All | All |
Application | Mozilla | Firefox Esr | 38.5.2 | All | All | All |
Application | Mozilla | Firefox Esr | 38.6.0 | All | All | All |
Application | Mozilla | Thunderbird | All | All | All | All |
Application | Sil | Graphite2 | 1.2.4 | All | All | All |
Application | Sil | Graphite2 | 1.2.4 | All | All | All |
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.5.2:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.5.2:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*:
- cpe:2.3:a:sil:graphite2:1.2.4:*:*:*:*:*:*:*:
- cpe:2.3:a:sil:graphite2:1.2.4:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE