The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
History
                    21 Nov 2024, 02:47
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html - | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html - Third Party Advisory | |
| References | () http://www.debian.org/security/2016/dsa-3510 - | |
| References | () http://www.debian.org/security/2016/dsa-3515 - | |
| References | () http://www.debian.org/security/2016/dsa-3520 - | |
| References | () http://www.mozilla.org/security/announce/2016/mfsa2016-37.html - Vendor Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/84222 - | |
| References | () http://www.securitytracker.com/id/1035215 - | |
| References | () http://www.ubuntu.com/usn/USN-2917-1 - | |
| References | () http://www.ubuntu.com/usn/USN-2917-2 - | |
| References | () http://www.ubuntu.com/usn/USN-2917-3 - | |
| References | () http://www.ubuntu.com/usn/USN-2927-1 - | |
| References | () http://www.ubuntu.com/usn/USN-2934-1 - | |
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1248876 - Issue Tracking | |
| References | () https://security.gentoo.org/glsa/201605-06 - | |
| References | () https://security.gentoo.org/glsa/201701-63 - | 
22 Oct 2024, 13:42
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:* | cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:* | 
21 Oct 2024, 13:11
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:* | cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:* | 
Information
                Published : 2016-03-13 18:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-1977
Mitre link : CVE-2016-1977
CVE.ORG link : CVE-2016-1977
JSON object : View
Products Affected
                suse
- linux_enterprise
opensuse
- leap
- opensuse
sil
- graphite2
oracle
- linux
mozilla
- firefox
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
