← Retour aux CVEs
CVE-2017-7778
N/ADescription
A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Details CVE
Score CVSS v3.1N/A
Publie6/11/2018
Derniere modification11/25/2025
Sourcenvd
Observations honeypot0
Produits affectes
debian:debian_linuxmozilla:firefoxmozilla:thunderbirdsil:graphite2
Faiblesses (CWE)
CWE-119CWE-125CWE-787
References
http://www.securityfocus.com/bid/99057(security@mozilla.org)
http://www.securitytracker.com/id/1038689(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2017:1440(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2017:1561(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2017:1793(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1349310(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1350047(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1352745(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1352747(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1355174(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1355182(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1356607(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1358551(security@mozilla.org)
https://security.gentoo.org/glsa/201710-13(security@mozilla.org)
https://www.debian.org/security/2017/dsa-3881(security@mozilla.org)
https://www.debian.org/security/2017/dsa-3894(security@mozilla.org)
https://www.debian.org/security/2017/dsa-3918(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-15/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-16/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-17/(security@mozilla.org)
http://www.securityfocus.com/bid/99057(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1038689(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1440(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1561(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1793(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1349310(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1350047(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1352745(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1352747(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1355174(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1355182(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1356607(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1358551(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201710-13(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-3881(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-3894(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-3918(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-15/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-16/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-17/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.