CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
89.5%
The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | 22 | cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* |
fedoraproject | fedora | 23 | cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.0 | cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.0.1 | cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.0.5 | cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.1.0 | cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.1.1 | cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.2.0 | cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.2.1 | cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:* |
mozilla | firefox_esr | 38.3.0 | cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:* |
blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html
lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
rhn.redhat.com/errata/RHSA-2016-0197.html
rhn.redhat.com/errata/RHSA-2016-0258.html
rhn.redhat.com/errata/RHSA-2016-0594.html
www.debian.org/security/2016/dsa-3477
www.debian.org/security/2016/dsa-3479
www.debian.org/security/2016/dsa-3491
www.mozilla.org/security/announce/2016/mfsa2016-14.html
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.securityfocus.com/bid/82991
www.securitytracker.com/id/1035017
www.ubuntu.com/usn/USN-2902-1
www.ubuntu.com/usn/USN-2904-1
bugzilla.mozilla.org/show_bug.cgi?id=1246093
security.gentoo.org/glsa/201605-06
security.gentoo.org/glsa/201701-35
security.gentoo.org/glsa/201701-63
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
89.5%