CVE-2012-1144
Vulnerability from cvelistv5
Published
2012-04-25 10:00
Modified
2024-08-06 18:45
Severity ?
Summary
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2012-0467.html
secalert@redhat.comhttp://secunia.com/advisories/48300
secalert@redhat.comhttp://secunia.com/advisories/48508
secalert@redhat.comhttp://secunia.com/advisories/48758
secalert@redhat.comhttp://secunia.com/advisories/48822
secalert@redhat.comhttp://secunia.com/advisories/48973
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201204-04.xml
secalert@redhat.comhttp://support.apple.com/kb/HT5503
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2428
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:057
secalert@redhat.comhttp://www.mozilla.org/security/announce/2012/mfsa2012-21.htmlVendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/06/16
secalert@redhat.comhttp://www.securityfocus.com/bid/52318
secalert@redhat.comhttp://www.securitytracker.com/id?1026765
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1403-1
secalert@redhat.comhttps://bugzilla.mozilla.org/show_bug.cgi?id=733512
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=800607
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-0467.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48300
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48508
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48758
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48822
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48973
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201204-04.xml
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5503
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2428
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2012/mfsa2012-21.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/06/16
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/52318
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026765
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1403-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.mozilla.org/show_bug.cgi?id=733512
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=800607
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:45:27.490Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "48300",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48300"
          },
          {
            "name": "48508",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48508"
          },
          {
            "name": "48822",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48822"
          },
          {
            "name": "MDVSA-2012:057",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057"
          },
          {
            "name": "APPLE-SA-2012-09-19-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
          },
          {
            "name": "48758",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48758"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5503"
          },
          {
            "name": "52318",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52318"
          },
          {
            "name": "USN-1403-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1403-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512"
          },
          {
            "name": "[oss-security] 20120306 Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16"
          },
          {
            "name": "SUSE-SU-2012:0484",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html"
          },
          {
            "name": "48973",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48973"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html"
          },
          {
            "name": "RHSA-2012:0467",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html"
          },
          {
            "name": "1026765",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026765"
          },
          {
            "name": "openSUSE-SU-2012:0489",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html"
          },
          {
            "name": "GLSA-201204-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml"
          },
          {
            "name": "DSA-2428",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2428"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-17T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "48300",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48300"
        },
        {
          "name": "48508",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48508"
        },
        {
          "name": "48822",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48822"
        },
        {
          "name": "MDVSA-2012:057",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057"
        },
        {
          "name": "APPLE-SA-2012-09-19-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
        },
        {
          "name": "48758",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48758"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5503"
        },
        {
          "name": "52318",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52318"
        },
        {
          "name": "USN-1403-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1403-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512"
        },
        {
          "name": "[oss-security] 20120306 Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16"
        },
        {
          "name": "SUSE-SU-2012:0484",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html"
        },
        {
          "name": "48973",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48973"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html"
        },
        {
          "name": "RHSA-2012:0467",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html"
        },
        {
          "name": "1026765",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026765"
        },
        {
          "name": "openSUSE-SU-2012:0489",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html"
        },
        {
          "name": "GLSA-201204-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml"
        },
        {
          "name": "DSA-2428",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2428"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-1144",
    "datePublished": "2012-04-25T10:00:00",
    "dateReserved": "2012-02-14T00:00:00",
    "dateUpdated": "2024-08-06T18:45:27.490Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-1144\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-04-25T10:10:18.777\",\"lastModified\":\"2024-11-21T01:36:31.777\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.\"},{\"lang\":\"es\",\"value\":\"FreeType antes de v2.4.9, tal como se utiliza en Mozilla Firefox Mobile antes de v10.0.4 y otros productos, permite a atacantes remotos causar una denegaci\u00f3n de servicio (operaci\u00f3n no v\u00e1lida de escritura y corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una fuente TrueType modificada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.8\",\"matchCriteriaId\":\"1AE5852E-FBD0-4F23-82C0-4E8FBDDF558B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888C3BB8-510B-4FBE-BA5D-0D488583C7DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B67236B-7DEF-40AE-BC6F-12CB39329C4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EEC5D17-9141-4CA5-9D4C-76C15BAE4FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1019F69-8E42-43C9-926C-B948659666F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA678E5E-9380-4D31-973F-018349F7F346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E06AD6E-8B77-4E57-AA07-507CD1F809F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB69925-10FB-4DFD-8764-B6640B88FCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B126D1A0-6B54-4C56-8CEC-B395D54A5C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98D0D1A3-886D-4EE3-AC1A-3B36D192E8B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB0B0E33-0D7D-45E9-ADFD-20C6DCB5ED64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CA4C7D-D70A-44CF-8E3D-F2612CCA0799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4E76672-7216-443E-BBD8-120DA96F7E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369D87D8-E4A7-4EC4-B508-2940EE174F95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"288FDB59-7FE4-4351-8822-554ADF07C79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B681257A-F8D8-46D5-995D-BC44F54DD5C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56E0DEB6-4414-49AB-88E9-988CE5D8EF67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56A90D08-2CAF-422F-8587-7D88EC7632A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B944FEB-F69D-4F6C-9485-26F95A5874B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B9B1DE-89F6-463D-A3F4-6366D5D30077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73474B9-6853-4C5C-9CB9-5F4D3080D1C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5283E910-D512-481C-804E-8717A83B24CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28C0F7A-F1F3-4F3B-81B9-228DA8FCCCD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7252819-BA8A-4BD1-BAAA-179A8777C994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11575E3C-2BEA-4264-AE41-4A962BD17035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D333A965-EAD2-40DB-8FBE-C4C7DF44C35C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA37666-D2E6-47EF-BFFE-A9449D6A72CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2B49505-C973-4673-A9BC-34ACA25059D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E8ECCA-58F2-4A05-8DF2-79C09A5FB275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8697D11D-BBDF-4722-85F7-5144A5D26E37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E3EDA8-04D1-4DF1-80BB-72C6003E8F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB06CA25-BB25-43B8-9FC2-62C399CC52EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AF7414E-33A7-40E2-AEF0-1AE9D7D1B077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC0BD12-E065-4CC9-8AEE-E4C34A58EC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214DC64B-BA35-486B-AE30-F2D9381E4D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7CDE19A-473A-4BC5-AA7B-3D08FEEEE82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD8401A8-A328-49F6-BAE8-337F5F36C906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FBF5BAA-8027-478F-BE06-3D3F4F823C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31358B5D-4087-4207-9730-297BA47DAA83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A73E016-A4B0-416D-B9B6-786A787DAD3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0588BCE1-059B-4602-B274-E9D268720B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D19BE9CC-6B1C-4AC8-9740-2ABDF40C4FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F3E33C-95E0-4EEF-8E26-F7044D8C3892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0871F88D-3D36-4EAA-B2B4-39D844FF8874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3396203-9BDF-4E7D-85CC-0B6AA7DC55C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.0.3\",\"matchCriteriaId\":\"C25B56F0-B244-4D64-BC8F-341214080A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B00C6411-5566-4060-B68B-8F1674B9E280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9C4A1A-E3C7-40DD-AF51-AFFA0D904722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A0EDF9-2260-439F-9CF0-A66CBE35ACF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E55723B-B7B8-4EBF-8767-55988D26E82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"761B33B6-4FFD-4E6C-92B4-2186F8D195C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4E272B-27F1-41CE-8B60-B1C098105A73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907FA1DF-E3D3-4E46-B353-753E70C292CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97DE5B71-865A-4DB0-A31A-1CA75A5AB7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64C7CE2-6BA7-4294-80CF-3AE25EE9529B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"640595E6-3E39-4112-887E-174C86D18630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E26E8D7-334C-4260-A8EE-82DF067CC081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643623BB-29E4-4138-AFC6-252368FC9495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CEA838D-5FE6-47A7-8367-F040FF01B681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF547E94-BEC4-4D32-A2AF-AFEBFE11782A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB1307C-64E4-4EC2-BB07-012107CA5DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_mobile:10.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C9D50D-9450-489C-8336-4332F8FD6806\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0467.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48300\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48508\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48758\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48822\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48973\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201204-04.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2428\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:057\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mozilla.org/security/announce/2012/mfsa2012-21.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/03/06/16\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/52318\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1026765\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1403-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=733512\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=800607\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0467.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48822\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201204-04.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2012/mfsa2012-21.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/03/06/16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/52318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026765\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1403-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=733512\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=800607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.