Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html | Third Party Advisory |
http://www.mozilla.org/security/announce/2015/mfsa2015-23.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | |
http://www.securityfocus.com/bid/72754 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1031791 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2505-1 | Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1098497 | Issue Tracking |
https://github.com/khaledhosny/ots/commit/003c62d28ae438aa8943cb31535563397f838a2c | Patch Issue Tracking |
https://security.gentoo.org/glsa/201504-01 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2015-02-25 11:59
Updated : 2024-02-04 18:35
NVD link : CVE-2015-0823
Mitre link : CVE-2015-0823
CVE.ORG link : CVE-2015-0823
JSON object : View
Products Affected
opensuse
- opensuse
opentype_sanitiser_project
- opentype_sanitiser
canonical
- ubuntu_linux
mozilla
- firefox
CWE