Vulnerability Details : CVE-2016-2792
The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2016-2792
Probability of exploitation activity in the next 30 days: 3.21%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-2792
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
[email protected] |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
[email protected] |
CWE ids for CVE-2016-2792
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2016-2792
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html
Third Party Advisory
- http://www.ubuntu.com/usn/USN-2934-1
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html
Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html
Third Party Advisory
- http://www.ubuntu.com/usn/USN-2917-1
- http://www.ubuntu.com/usn/USN-2917-3
- http://www.debian.org/security/2016/dsa-3515
- http://www.securitytracker.com/id/1035215
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1243482
Issue Tracking
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Third Party Advisory
- https://security.gentoo.org/glsa/201605-06
-
http://www.mozilla.org/security/announce/2016/mfsa2016-37.html
Vendor Advisory
- http://www.debian.org/security/2016/dsa-3520
- http://www.securityfocus.com/bid/84222
- http://www.ubuntu.com/usn/USN-2927-1
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
- https://security.gentoo.org/glsa/201701-63
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html
Third Party Advisory
- http://www.ubuntu.com/usn/USN-2917-2
- http://www.debian.org/security/2016/dsa-3510
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
Products affected by CVE-2016-2792
- cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
- cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*