CVE-2012-1142

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
References
Link Resource
http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-0467.html
http://secunia.com/advisories/48300
http://secunia.com/advisories/48508
http://secunia.com/advisories/48758
http://secunia.com/advisories/48797
http://secunia.com/advisories/48822
http://secunia.com/advisories/48918
http://secunia.com/advisories/48951
http://secunia.com/advisories/48973
http://security.gentoo.org/glsa/glsa-201204-04.xml
http://support.apple.com/kb/HT5503
http://www.debian.org/security/2012/dsa-2428
http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
http://www.mozilla.org/security/announce/2012/mfsa2012-21.html Vendor Advisory
http://www.openwall.com/lists/oss-security/2012/03/06/16
http://www.securityfocus.com/bid/52318
http://www.securitytracker.com/id?1026765
http://www.ubuntu.com/usn/USN-1403-1
https://bugzilla.mozilla.org/show_bug.cgi?id=733512
https://bugzilla.redhat.com/show_bug.cgi?id=800604
http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-0467.html
http://secunia.com/advisories/48300
http://secunia.com/advisories/48508
http://secunia.com/advisories/48758
http://secunia.com/advisories/48797
http://secunia.com/advisories/48822
http://secunia.com/advisories/48918
http://secunia.com/advisories/48951
http://secunia.com/advisories/48973
http://security.gentoo.org/glsa/glsa-201204-04.xml
http://support.apple.com/kb/HT5503
http://www.debian.org/security/2012/dsa-2428
http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
http://www.mozilla.org/security/announce/2012/mfsa2012-21.html Vendor Advisory
http://www.openwall.com/lists/oss-security/2012/03/06/16
http://www.securityfocus.com/bid/52318
http://www.securitytracker.com/id?1026765
http://www.ubuntu.com/usn/USN-1403-1
https://bugzilla.mozilla.org/show_bug.cgi?id=733512
https://bugzilla.redhat.com/show_bug.cgi?id=800604
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:4.0:beta1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:4.0:beta3:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:7.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:8.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:9.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_mobile:10.0.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - () http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html - () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html -
References () http://rhn.redhat.com/errata/RHSA-2012-0467.html - () http://rhn.redhat.com/errata/RHSA-2012-0467.html -
References () http://secunia.com/advisories/48300 - () http://secunia.com/advisories/48300 -
References () http://secunia.com/advisories/48508 - () http://secunia.com/advisories/48508 -
References () http://secunia.com/advisories/48758 - () http://secunia.com/advisories/48758 -
References () http://secunia.com/advisories/48797 - () http://secunia.com/advisories/48797 -
References () http://secunia.com/advisories/48822 - () http://secunia.com/advisories/48822 -
References () http://secunia.com/advisories/48918 - () http://secunia.com/advisories/48918 -
References () http://secunia.com/advisories/48951 - () http://secunia.com/advisories/48951 -
References () http://secunia.com/advisories/48973 - () http://secunia.com/advisories/48973 -
References () http://security.gentoo.org/glsa/glsa-201204-04.xml - () http://security.gentoo.org/glsa/glsa-201204-04.xml -
References () http://support.apple.com/kb/HT5503 - () http://support.apple.com/kb/HT5503 -
References () http://www.debian.org/security/2012/dsa-2428 - () http://www.debian.org/security/2012/dsa-2428 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2012:057 - () http://www.mandriva.com/security/advisories?name=MDVSA-2012:057 -
References () http://www.mozilla.org/security/announce/2012/mfsa2012-21.html - Vendor Advisory () http://www.mozilla.org/security/announce/2012/mfsa2012-21.html - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2012/03/06/16 - () http://www.openwall.com/lists/oss-security/2012/03/06/16 -
References () http://www.securityfocus.com/bid/52318 - () http://www.securityfocus.com/bid/52318 -
References () http://www.securitytracker.com/id?1026765 - () http://www.securitytracker.com/id?1026765 -
References () http://www.ubuntu.com/usn/USN-1403-1 - () http://www.ubuntu.com/usn/USN-1403-1 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=733512 - () https://bugzilla.mozilla.org/show_bug.cgi?id=733512 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=800604 - () https://bugzilla.redhat.com/show_bug.cgi?id=800604 -

Information

Published : 2012-04-25 10:10

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1142

Mitre link : CVE-2012-1142

CVE.ORG link : CVE-2012-1142


JSON object : View

Products Affected

freetype

  • freetype

mozilla

  • firefox_mobile
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer