CVE-2016-1709
Published: 07/23/2016 19:59:05
Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.
HIGH
CVSS v3: 8.8
CVSS v3: 8.8
Status
DocFilters Release | Package | State | Justification | Comment |
---|---|---|---|---|
25.1 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
25.1 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
24.4 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
24.4 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
24.4.0 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
24.4.0 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
24.3 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
24.3 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
24.2.1 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
24.2.1 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
24.2 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
24.2 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
24.1 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
24.1 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
23.3 | sfntly (r239) | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
23.3 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
23.2.1 | sfntly () | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
23.2.1 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
23.2 | sfntly () | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
23.2 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
23.1 | sfntly () | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
23.1 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
22.4 | sfntly () | Resolved | Code Not Present | Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 |
22.4 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
22.3 | sfntly () | Resolved | manually patched data/byte_array.cc | |
22.3 | chrome (103.0.5060.123) | Not Affected | Protected At Runtime | CVE does not included required value ‘pdfium’ |
22.2 | sfntly () | Resolved | manually patched data/byte_array.cc | |
22.1 | sfntly () | Resolved | manually patched data/byte_array.cc | |
21.11.1 | sfntly () | Resolved | manually patched data/byte_array.cc | |
21.11 | sfntly () | Resolved | manually patched data/byte_array.cc | |
21.8.1 | sfntly () | Resolved | manually patched data/byte_array.cc | |
21.8 | sfntly () | Resolved | manually patched data/byte_array.cc | |
21.5.1 | sfntly () | Resolved | manually patched data/byte_array.cc | |
21.5.0 | sfntly () | Resolved | manually patched data/byte_array.cc | |
21.2.0 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.20 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.19.3667 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.18.3599 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.17 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.16.3445 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.15.3368 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.14.3263 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.13.3179 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.12.3054 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.11.3040 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.11.2990 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.10.2934 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.9.2878 | sfntly () | Resolved | manually patched data/byte_array.cc | |
11.4.8.2822 | sfntly () | Resolved | manually patched data/byte_array.cc |
Severity score breakdown
Attack Complexity
LOW
Attack Vector
NETWORK
Availability Impact
HIGH
Base Score
8.8
Base Severity
HIGH
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Privileges Required
NONE
Scope
UNCHANGED
User Interaction
REQUIRED
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version
3.0