Vulnerability Details : CVE-2015-6103
The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Memory Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-6104.
Vulnerability category: Input validationExecute code
Products affected by CVE-2015-6103
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6103
15.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6103
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2015-6103
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6103
-
http://packetstormsecurity.com/files/134397/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html
Microsoft Windows Kernel Win32k.sys TTF Font Processing Buffer Overflow ≈ Packet StormThird Party Advisory;VDB Entry
-
https://code.google.com/p/google-security-research/issues/detail?id=506
506 - Windows Kernel win32k.sys TTF font processing: pool-based buffer overflow with malformed OS/2 table - project-zero - MonorailExploit;Mailing List;Third Party Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115
Microsoft Security Bulletin MS15-115 - Critical | Microsoft DocsPatch;Vendor Advisory
-
https://www.exploit-db.com/exploits/38714/
Microsoft Windows Kernel - 'win32k.sys' Malformed OS/2 Table TTF Font Processing Pool-Based Buffer Overflow (MS15-115)Exploit;Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1034114
Microsoft Windows Kernel Bugs Let Remote Users Execute Arbitrary Code and Local Users Bypass ASLR Restricitions and Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
Jump to