Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.
References
Link | Resource |
---|---|
https://github.com/khaledhosny/ots/commit/003c62d28ae438aa8943cb31535563397f838a2c | Patch Issue Tracking |
http://www.mozilla.org/security/announce/2015/mfsa2015-23.html | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1098497 | Issue Tracking |
http://www.securitytracker.com/id/1031791 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/72754 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2505-1 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | |
https://security.gentoo.org/glsa/201504-01 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2015-02-25 03:59
Updated : 2018-10-30 09:27
NVD link : CVE-2015-0823
Mitre link : CVE-2015-0823
JSON object : View
CWE
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux
opentype_sanitiser_project
- opentype_sanitiser
opensuse
- opensuse