CVE-2016-5384

fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:fontconfig_project:fontconfig:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*

History

12 Feb 2023, 23:23

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2016:2601', 'name': 'https://access.redhat.com/errata/RHSA-2016:2601', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2016-5384', 'name': 'https://access.redhat.com/security/cve/CVE-2016-5384', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1350891', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1350891', 'tags': [], 'refsource': 'MISC'}
Summary It was found that cache files were insufficiently validated in fontconfig. A local attacker could create a specially crafted cache file to trigger arbitrary free() calls, which in turn could lead to arbitrary code execution. fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.

02 Feb 2023, 21:17

Type Values Removed Values Added
Summary fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file. It was found that cache files were insufficiently validated in fontconfig. A local attacker could create a specially crafted cache file to trigger arbitrary free() calls, which in turn could lead to arbitrary code execution.
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/', 'name': 'FEDORA-2016-6802f2e52a', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/', 'name': 'FEDORA-2016-e23ab56ce3', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • (MISC) https://access.redhat.com/errata/RHSA-2016:2601 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2016-5384 -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1350891 -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/ -

31 Jan 2022, 17:37

Type Values Removed Values Added
CPE cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
References (UBUNTU) http://www.ubuntu.com/usn/USN-3063-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-3063-1 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/92339 - (BID) http://www.securityfocus.com/bid/92339 - Third Party Advisory, VDB Entry
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ - Mailing List, Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2601.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2601.html - Third Party Advisory
References (MLIST) https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html - Release Notes (MLIST) https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html - Mailing List, Patch, Third Party Advisory
References (CONFIRM) https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 - Patch (CONFIRM) https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 - Patch, Third Party Advisory
First Time Canonical ubuntu Linux
Canonical

Information

Published : 2016-08-13 01:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-5384

Mitre link : CVE-2016-5384

CVE.ORG link : CVE-2016-5384


JSON object : View

Products Affected

fedoraproject

  • fedora

canonical

  • ubuntu_linux

fontconfig_project

  • fontconfig

debian

  • debian_linux
CWE
CWE-415

Double Free