CVE-2016-1709

Published: 07/23/2016 19:59:05
Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.
HIGH
CVSS v3: 8.8

Status

DocFilters Release Package State Justification Comment
25.1 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
25.1 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
24.4 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
24.4 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
24.4.0 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
24.4.0 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
24.3 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
24.3 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
24.2.1 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
24.2.1 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
24.2 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
24.2 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
24.1 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
24.1 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
23.3 sfntly (r239) Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
23.3 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
23.2.1 sfntly () Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
23.2.1 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
23.2 sfntly () Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
23.2 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
23.1 sfntly () Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
23.1 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
22.4 sfntly () Resolved Code Not Present Patched applied from https://github.com/googlefonts/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
22.4 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
22.3 sfntly () Resolved manually patched data/byte_array.cc
22.3 chrome (103.0.5060.123) Not Affected Protected At Runtime CVE does not included required value ‘pdfium’
22.2 sfntly () Resolved manually patched data/byte_array.cc
22.1 sfntly () Resolved manually patched data/byte_array.cc
21.11.1 sfntly () Resolved manually patched data/byte_array.cc
21.11 sfntly () Resolved manually patched data/byte_array.cc
21.8.1 sfntly () Resolved manually patched data/byte_array.cc
21.8 sfntly () Resolved manually patched data/byte_array.cc
21.5.1 sfntly () Resolved manually patched data/byte_array.cc
21.5.0 sfntly () Resolved manually patched data/byte_array.cc
21.2.0 sfntly () Resolved manually patched data/byte_array.cc
11.4.20 sfntly () Resolved manually patched data/byte_array.cc
11.4.19.3667 sfntly () Resolved manually patched data/byte_array.cc
11.4.18.3599 sfntly () Resolved manually patched data/byte_array.cc
11.4.17 sfntly () Resolved manually patched data/byte_array.cc
11.4.16.3445 sfntly () Resolved manually patched data/byte_array.cc
11.4.15.3368 sfntly () Resolved manually patched data/byte_array.cc
11.4.14.3263 sfntly () Resolved manually patched data/byte_array.cc
11.4.13.3179 sfntly () Resolved manually patched data/byte_array.cc
11.4.12.3054 sfntly () Resolved manually patched data/byte_array.cc
11.4.11.3040 sfntly () Resolved manually patched data/byte_array.cc
11.4.11.2990 sfntly () Resolved manually patched data/byte_array.cc
11.4.10.2934 sfntly () Resolved manually patched data/byte_array.cc
11.4.9.2878 sfntly () Resolved manually patched data/byte_array.cc
11.4.8.2822 sfntly () Resolved manually patched data/byte_array.cc

Severity score breakdown

Attack Complexity
LOW
Attack Vector
NETWORK
Availability Impact
HIGH
Base Score
8.8
Base Severity
HIGH
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Privileges Required
NONE
Scope
UNCHANGED
User Interaction
REQUIRED
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version
3.0

References