Think you have a false positive on this rule?

Sid 1-36225

Message

FILE-OTHER Libgraphite empty feature list denial of service attempt

Summary

Code.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not consider recursive load calls during a size check, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via a crafted Graphite smart font.

Impact

CVSS base score 8.8 CVSS impact score 5.9 CVSS exploitability score 2.8 confidentialityImpact HIGH integrityImpact HIGH availabilityImpact HIGH

CVE-2016-1522:

CVSS base score 8.8

CVSS impact score 5.9

CVSS exploitability score 2.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2016-1522: Code.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not consider recursive load calls during a size check, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via a crafted Graphite smart font.

Affected systems

  • mozilla firefox_esr 38.0
  • mozilla firefox_esr 38.0.1
  • mozilla firefox_esr 38.0.5
  • mozilla firefox_esr 38.1.0
  • mozilla firefox_esr 38.1.1
  • mozilla firefox_esr 38.2.0
  • mozilla firefox_esr 38.2.1
  • mozilla firefox_esr 38.3.0
  • mozilla firefox_esr 38.4.0
  • mozilla firefox_esr 38.5.0
  • mozilla firefox_esr 38.5.1
  • mozilla firefox_esr 38.5.2
  • mozilla firefox_esr 38.6.0
  • mozilla thunderbird 38.5.1
  • sil graphite2 1.2.4
  • debian debian_linux 7.0
  • debian debian_linux 8.0
  • fedoraproject fedora 22
  • fedoraproject fedora 23

Ease of attack

CVE-2016-1522:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • www.talosintelligence.com/reports/TALOS-2016-0060