First published: Wed Dec 16 2015(Updated: )
Buffer overflow in the DirectWriteFontInfo::LoadFontFamilyData function in gfx/thebes/gfxDWriteFontList.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted font-family name.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=42.0 | |
Fedora | =22 | |
Fedora | =23 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7203 has a moderate severity rating due to the potential for denial of service and remote attacks.
To fix CVE-2015-7203, upgrade to Mozilla Firefox version 43.0 or later.
CVE-2015-7203 affects Mozilla Firefox versions prior to 43.0.
Yes, CVE-2015-7203 affects Fedora versions 22 and 23, as well as openSUSE versions 13.1, 13.2, and Leap 42.1.
CVE-2015-7203 allows remote attackers to exploit a buffer overflow vulnerability leading to potential denial of service.