Vulnerability Details : CVE-2015-6781
Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2015-6781
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6781
1.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6781
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-6781
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6781
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
[security-announce] openSUSE-SU-2015:2291-1: important: Security update
-
http://www.securityfocus.com/bid/78416
Google Chrome Prior to 47.0.2526.73 Multiple Security Vulnerabilities
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
[security-announce] openSUSE-SU-2015:2290-1: important: Security update
-
http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://security.gentoo.org/glsa/201603-09
Chromium: Multiple vulnerabilities (GLSA 201603-09) — Gentoo security
-
https://code.google.com/p/chromium/issues/detail?id=497302
497302 - Integer-overflow in sfntly::FontData::Bound - chromium - Monorail
-
https://github.com/googlei18n/sfntly/commit/de776d4ef06ca29c240de3444348894f032b03ff
Check for integer overflow in sfntly::FontData::Bound(). · googlefonts/sfntly@de776d4 · GitHub
-
http://www.securitytracker.com/id/1034298
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, and Spoof Content - SecurityTracker
-
https://codereview.chromium.org/1367323002/
Issue 1367323002: Pull sfntly from GitHub instead of code.google.com. - Code Review
-
http://www.debian.org/security/2015/dsa-3415
Debian -- Security Information -- DSA-3415-1 chromium-browser
Jump to