← Volver a CVEs
CVE-2020-15999
CRITICALCISA KEV9.6
Descripcion
Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Detalles CVE
Puntuacion CVSS v3.19.6
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado11/3/2020
Ultima modificacion10/24/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorGoogle
ProductoChrome FreeType
Nombre vulnerabilidadGoogle Chrome FreeType Heap Buffer Overflow Vulnerability
Fecha inclusion KEV2021-11-03
Fecha limite remediacion2021-11-17
Uso en ransomwareUnknown
Productos afectados
debian:debian_linuxfedoraproject:fedorafreetype:freetypegoogle:chromenetapp:ontap_select_deploy_administration_utilityopensuse:backports_sle
Debilidades (CWE)
CWE-787CWE-120
Referencias
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html(chrome-cve-admin@google.com)
http://seclists.org/fulldisclosure/2020/Nov/33(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html(chrome-cve-admin@google.com)
https://crbug.com/1139963(chrome-cve-admin@google.com)
https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202011-12(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202012-04(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202401-19(chrome-cve-admin@google.com)
https://www.debian.org/security/2021/dsa-4824(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/Nov/33(af854a3a-2127-422b-91ae-364da2661108)
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1139963(af854a3a-2127-422b-91ae-364da2661108)
https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202011-12(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202012-04(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202401-19(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240812-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4824(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-15999(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.