Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-6106 | First vendor Publication | 2015-12-09 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6106 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 3 | |
Application | 3 | |
Application | 1 | |
Application | 1 | |
Os | 1 | |
Os | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Microsoft Office Word OGL module out of bounds read attempt RuleID : 36967 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word OGL module out of bounds read attempt RuleID : 36966 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word gdiplus integer overflow attempt RuleID : 36965 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office Word gdiplus integer overflow attempt RuleID : 36964 - Revision : 2 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-12-08 | Name : A multimedia application framework installed on the remote Mac OS X host is a... File : macosx_ms15-128.nasl - Type : ACT_GATHER_INFO |
2015-12-08 | Name : The remote host is affected by multiple remote code execution vulnerabilities. File : smb_nt_ms15-128.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:49:13 |
|
2021-05-04 12:41:23 |
|
2021-04-22 01:50:17 |
|
2020-05-23 00:46:22 |
|
2018-10-13 05:18:57 |
|
2017-09-13 09:23:31 |
|
2015-12-10 00:23:51 |
|
2015-12-09 17:25:07 |
|