← Volver a CVEs
CVE-2016-1709
N/ADescripcion
Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado7/23/2016
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
google:chromegoogle:sfntly
Debilidades (CWE)
CWE-119
Referencias
http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html(chrome-cve-admin@google.com)
http://rhn.redhat.com/errata/RHSA-2016-1485.html(chrome-cve-admin@google.com)
http://www.debian.org/security/2016/dsa-3637(chrome-cve-admin@google.com)
http://www.securityfocus.com/bid/92053(chrome-cve-admin@google.com)
http://www.securitytracker.com/id/1036428(chrome-cve-admin@google.com)
https://crbug.com/614934(chrome-cve-admin@google.com)
https://github.com/googlei18n/sfntly/commit/468cad540fa1b0027cad60456f53feabecdce2bc(chrome-cve-admin@google.com)
https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92(chrome-cve-admin@google.com)
https://github.com/googlei18n/sfntly/pull/56(chrome-cve-admin@google.com)
http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-1485.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3637(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/92053(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1036428(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/614934(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/googlei18n/sfntly/commit/468cad540fa1b0027cad60456f53feabecdce2bc(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/googlei18n/sfntly/pull/56(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.