CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
93.4%
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
Vendor | Product | Version | CPE |
---|---|---|---|
freetype | freetype | * | cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:* |
freetype | freetype | 1.3.1 | cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:* |
freetype | freetype | 2.0.0 | cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:* |
freetype | freetype | 2.0.1 | cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:* |
freetype | freetype | 2.0.2 | cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:* |
freetype | freetype | 2.0.3 | cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:* |
freetype | freetype | 2.0.4 | cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:* |
freetype | freetype | 2.0.5 | cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:* |
freetype | freetype | 2.0.6 | cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:* |
freetype | freetype | 2.0.7 | cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
rhn.redhat.com/errata/RHSA-2012-0467.html
secunia.com/advisories/48508
secunia.com/advisories/48758
secunia.com/advisories/48822
secunia.com/advisories/48973
security.gentoo.org/glsa/glsa-201204-04.xml
support.apple.com/kb/HT5503
www.mandriva.com/security/advisories?name=MDVSA-2012:057
www.mozilla.org/security/announce/2012/mfsa2012-21.html
www.openwall.com/lists/oss-security/2012/03/06/16
www.securityfocus.com/bid/52318
www.securitytracker.com/id?1026765
www.ubuntu.com/usn/USN-1403-1
bugzilla.mozilla.org/show_bug.cgi?id=733512
bugzilla.redhat.com/show_bug.cgi?id=800600