CVE-2010-1028

NameCVE-2010-1028
DescriptionInteger overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs787085

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
calibre (PTS)jessie2.5.0+dfsg-1vulnerable
stretch2.75.1+dfsg-1fixed
buster3.39.1+dfsg-3fixed
bullseye5.12.0+dfsg-1+deb11u2fixed
bullseye (security)5.12.0+dfsg-1+deb11u3fixed
bookworm6.13.0+repack-2+deb12u4fixed
sid, trixie7.21.0+ds-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
calibresourcewheezy(not affected)
calibresource(unstable)2.38.0+dfsg-1787085
iceapesource(unstable)(not affected)
xulrunnersource(unstable)(not affected)

Notes

- xulrunner <not-affected> (vulnerability introduced in firefox 3.6)
- iceape <not-affected> (Vulnerable code not present)
[jessie] - calibre <no-dsa> (Minor issue)
[wheezy] - calibre <not-affected> (src/calibre/utils/fonts/woff/ not introduced until version 0.9.33)
2.38.0+dfsg-1 removed the copy of woff below src/calibre/utils/fonts/woff/

Search for package or bug name: Reporting problems