CVE-2017-7778
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
11/06/2018
Last modified:
25/11/2025
Description
A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 52.2.0 (excluding) | |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 54.0 (excluding) | |
| cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* | 52.2.0 (excluding) | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:* | 1.3.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/99057
- http://www.securitytracker.com/id/1038689
- https://access.redhat.com/errata/RHSA-2017:1440
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1793
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
- https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
- https://security.gentoo.org/glsa/201710-13
- https://www.debian.org/security/2017/dsa-3881
- https://www.debian.org/security/2017/dsa-3894
- https://www.debian.org/security/2017/dsa-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- http://www.securityfocus.com/bid/99057
- http://www.securitytracker.com/id/1038689
- https://access.redhat.com/errata/RHSA-2017:1440
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1793
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
- https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
- https://security.gentoo.org/glsa/201710-13
- https://www.debian.org/security/2017/dsa-3881
- https://www.debian.org/security/2017/dsa-3894
- https://www.debian.org/security/2017/dsa-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/



