Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-2510 | First vendor Publication | 2015-09-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Buffer overflow in the Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "Graphics Component Buffer Overflow Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2510 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 5 | |
Application | 2 | |
Os | 1 | |
Os | 1 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-09-10 | IAVM : 2015-A-0212 - Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity : Category II - VMSKEY : V0061385 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-10-14 | Microsoft Windows Win32k.sys use after free attempt RuleID : 36029 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows Win32k.sys use after free attempt RuleID : 36028 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows use after free kernel privilege escalation attempt RuleID : 36017 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows use after free kernel privilege escalation attempt RuleID : 36016 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows desktop window privilege escalation attempt RuleID : 35995 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows desktop window privilege escalation attempt RuleID : 35994 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | NtGdiStretchBlt buffer overflow privilege escalation attempt RuleID : 35989 - Revision : 3 - Type : FILE-EXECUTABLE |
2015-10-14 | NtGdiStretchBlt buffer overflow privilege escalation attempt RuleID : 35988 - Revision : 3 - Type : FILE-EXECUTABLE |
2015-10-14 | Microsoft Windows NtUserSetWindowsHook memory disclosure attempt RuleID : 35987 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows NtUserSetWindowsHook memory disclosure attempt RuleID : 35986 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows GDI+ denial of service attempt RuleID : 35985 - Revision : 2 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows GDI+ denial of service attempt RuleID : 35984 - Revision : 2 - Type : OS-WINDOWS |
2015-10-06 | Microsoft Windows SURFACE objects kernel privilege escalation attempt RuleID : 35974 - Revision : 2 - Type : OS-WINDOWS |
2015-10-06 | Microsoft Windows SURFACE objects kernel privilege escalation attempt RuleID : 35973 - Revision : 2 - Type : OS-WINDOWS |
2015-08-25 | Microsoft Windows CDD font parsing kernel memory corruption attempt RuleID : 35720 - Revision : 4 - Type : OS-WINDOWS |
2015-08-25 | Microsoft Windows CDD font parsing kernel memory corruption attempt RuleID : 35719 - Revision : 3 - Type : OS-WINDOWS |
2015-04-14 | Microsoft Windows NtUserGetClipboardAccessToken privilege escalation attempt RuleID : 33766 - Revision : 4 - Type : OS-WINDOWS |
2015-04-14 | Microsoft Windows NtUserGetClipboardAccessToken privilege escalation attempt RuleID : 33765 - Revision : 4 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-09-09 | Name : The remote host is affected by multiple vulnerabilities. File : smb_nt_ms15-097.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:46:20 |
|
2021-05-04 12:38:57 |
|
2021-04-22 01:47:43 |
|
2020-05-23 00:44:45 |
|
2018-10-13 05:18:55 |
|
2017-09-16 09:23:16 |
|
2016-12-22 09:23:54 |
|
2016-11-29 00:25:08 |
|
2016-04-27 02:14:46 |
|
2015-10-18 17:24:16 |
|
2015-10-14 21:22:21 |
|
2015-09-11 21:25:32 |
|
2015-09-10 21:27:00 |
|
2015-09-10 13:26:26 |
|
2015-09-10 00:24:48 |
|
2015-09-09 21:26:28 |
|
2015-09-09 09:24:59 |
|