This out-of-bound read may lead to an application crash, information disclosure via program memory or other context-dependent impact. This crash affects the availability of the software and dependent downstream components.Ī heap-buffer-overflow in pcf2bdf, versions >= 1.05 allows an attacker to trigger unsafe memory access via a specially crafted PCF font file. This vulnerability affects Firefox =1.05 allows an attacker to trigger a program crash via a specially crafted PCF font file. This vulnerability affects Firefox for Android FontFace() on a background worker, a use-after-free could have occurred, leading to a potentially exploitable crash. Multiple race conditions in the font initialization could have led to memory corruption and execution of attacker-controlled code. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service. ![]() Windows Server Service Security Feature Bypass Vulnerability Ī flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. Certain HP LaserJet Pro print products are potentially vulnerable to a stack-based buffer overflow related to the compact font format parser.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |