CVE-2010-1028

NameCVE-2010-1028
DescriptionInteger overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)
Debian Bugs787085

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
calibre (PTS)wheezy0.8.51+dfsg1-0.1fixed
wheezy (security)0.8.51+dfsg1-0.1+deb7u1fixed
jessie2.5.0+dfsg-1vulnerable
stretch, sid2.75.1+dfsg-1fixed
xulrunner (PTS)wheezy (security), wheezy24.8.1esr-2~deb7u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
calibresource(unstable)2.38.0+dfsg-1high787085
calibresourcewheezy(not affected)
iceapesource(unstable)(not affected)
xulrunnersource(unstable)(not affected)

Notes

- xulrunner <not-affected> (vulnerability introduced in firefox 3.6)
- iceape <not-affected> (Vulnerable code not present)
[wheezy] - calibre <not-affected> (src/calibre/utils/fonts/woff/ not introduced until version 0.9.33)
2.38.0+dfsg-1 removed the copy of woff below src/calibre/utils/fonts/woff/

Search for package or bug name: Reporting problems