Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-1670 | First vendor Publication | 2015-05-13 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, allows remote attackers to obtain sensitive information from process memory via a crafted OpenType font on a web site, aka "OpenType Font Parsing Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1670 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28362 | |||
Oval ID: | oval:org.mitre.oval:def:28362 | ||
Title: | OpenType Font parsing vulnerability - CVE-2015-1670 (MS15-044) | ||
Description: | The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, allows remote attackers to obtain sensitive information from process memory via a crafted OpenType font on a web site, aka "OpenType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2015-1670 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | Microsoft .NET Framework 4.5 Microsoft .NET Framework 4.5.1 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.0 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2015-06-17 | Microsoft Windows Win32k TrueType Font parsing out of bounds attempt RuleID : 34441 - Revision : 2 - Type : OS-WINDOWS |
2015-06-17 | Microsoft Windows Win32k TrueType Font parsing out of bounds attempt RuleID : 34440 - Revision : 2 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms15-044.nasl - Type : ACT_GATHER_INFO |
2015-05-12 | Name : A multimedia application framework installed on the remote Mac OS X host is a... File : macosx_ms15-049.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:45:58 |
|
2024-08-02 12:32:09 |
|
2024-08-02 01:09:33 |
|
2024-02-02 01:31:11 |
|
2024-02-01 12:09:09 |
|
2023-09-05 12:29:38 |
|
2023-09-05 01:09:01 |
|
2023-09-02 12:29:34 |
|
2023-09-02 01:09:11 |
|
2023-08-12 12:32:18 |
|
2023-08-12 01:08:39 |
|
2023-08-11 12:27:40 |
|
2023-08-11 01:08:53 |
|
2023-08-06 12:26:52 |
|
2023-08-06 01:08:38 |
|
2023-08-04 12:26:58 |
|
2023-08-04 01:08:42 |
|
2023-07-14 12:26:57 |
|
2023-07-14 01:08:40 |
|
2023-03-29 01:28:41 |
|
2023-03-28 12:09:00 |
|
2022-10-11 12:24:16 |
|
2022-10-11 01:08:49 |
|
2021-05-04 12:38:39 |
|
2021-04-22 01:47:21 |
|
2020-11-24 12:13:32 |
|
2020-05-23 00:44:30 |
|
2018-10-13 05:18:52 |
|
2017-01-06 00:23:41 |
|
2017-01-03 09:23:13 |
|
2016-04-27 02:08:28 |
|
2015-05-21 00:28:15 |
|
2015-05-19 21:29:50 |
|
2015-05-15 00:25:01 |
|
2015-05-14 13:28:12 |
|
2015-05-13 17:26:18 |
|