CVE-2012-1134

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.

References

http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html

http://rhn.redhat.com/errata/RHSA-2012-0467.html

http://secunia.com/advisories/48300

http://secunia.com/advisories/48508

http://secunia.com/advisories/48758

http://secunia.com/advisories/48797

http://secunia.com/advisories/48822

http://secunia.com/advisories/48918

http://secunia.com/advisories/48951

http://secunia.com/advisories/48973

http://security.gentoo.org/glsa/glsa-201204-04.xml

http://support.apple.com/kb/HT5503

http://www.debian.org/security/2012/dsa-2428

http://www.mandriva.com/security/advisories?name=MDVSA-2012:057

http://www.mozilla.org/security/announce/2012/mfsa2012-21.html

http://www.openwall.com/lists/oss-security/2012/03/06/16

http://www.securityfocus.com/bid/52318

http://www.securitytracker.com/id?1026765

http://www.ubuntu.com/usn/USN-1403-1

https://bugzilla.mozilla.org/show_bug.cgi?id=733512

https://bugzilla.redhat.com/show_bug.cgi?id=800592

Details

Source: MITRE

Published: 2012-04-25

Updated: 2021-01-26

Type: CWE-119

Risk Information

CVSS v2

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:* versions up to 2.4.8 (inclusive)

cpe:2.3:a:mozilla:firefox_mobile:1.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:4.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:4.0:beta1:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:4.0:beta2:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:4.0:beta3:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:4.0:beta4:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:5.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:6.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:6.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:6.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:7.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:8.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:9.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:10.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:10.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:10.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox_mobile:*:*:*:*:*:*:*:* versions up to 10.0.3 (inclusive)

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
80616Oracle Solaris Third-Party Patch Update : freetype (multiple_denial_of_service_dos1)NessusSolaris Local Security Checks
critical
74597openSUSE Security Update : freetype2 (openSUSE-SU-2012:0489-1)NessusSuSE Local Security Checks
critical
69673Amazon Linux AMI : freetype (ALAS-2012-66)NessusAmazon Linux Local Security Checks
critical
68508Oracle Linux 5 / 6 : freetype (ELSA-2012-0467)NessusOracle Linux Local Security Checks
critical
6589Apple iOS < 6.0 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
high
62242Apple iOS < 6.0 Multiple VulnerabilitiesNessusMobile Devices
critical
61295Scientific Linux Security Update : freetype on SL5.x, SL6.x i386/x86_64 (20120410)NessusScientific Linux Local Security Checks
critical
59620GLSA-201204-04 : FreeType: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
58864FreeBSD : mozilla -- multiple vulnerabilities (380e8c56-8e32-11e1-9580-4061862b8c22)NessusFreeBSD Local Security Checks
critical
58734Mandriva Linux Security Advisory : freetype2 (MDVSA-2012:057)NessusMandriva Local Security Checks
critical
58722SuSE 10 Security Update : freetype2 (ZYPP Patch Number 8039)NessusSuSE Local Security Checks
critical
58720SuSE 11.1 Security Update : freetype2 (SAT Patch Number 6052)NessusSuSE Local Security Checks
critical
58674RHEL 5 / 6 : freetype (RHSA-2012:0467)NessusRed Hat Local Security Checks
critical
58665CentOS 5 / 6 : freetype (CESA-2012:0467)NessusCentOS Local Security Checks
critical
58641FreeBSD : freetype -- multiple vulnerabilities (462e2d6c-8017-11e1-a571-bcaec565249c)NessusFreeBSD Local Security Checks
critical
58444Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : freetype vulnerabilities (USN-1403-1)NessusUbuntu Local Security Checks
critical
58295Debian DSA-2428-1 : freetype - several vulnerabilitiesNessusDebian Local Security Checks
high