7.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
harfbuzz is vulnerable to arbitrary code execution. A buffer over-read resulting from an inverted length check in hb-ot-font.cc
allows an attacker to crash the application and potentially obtain arbitrary code execution.
googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
lists.opensuse.org/opensuse-updates/2016-08/msg00070.html
rhn.redhat.com/errata/RHSA-2016-0072.html
www.securityfocus.com/bid/81812
www.securitytracker.com/id/1034801
www.ubuntu.com/usn/USN-2877-1
www.ubuntu.com/usn/USN-3067-1
code.google.com/p/chromium/issues/detail?id=544270
code.google.com/p/chromium/issues/detail?id=579625
github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5
github.com/behdad/harfbuzz/issues/139#issuecomment-148289957
github.com/harfbuzz/harfbuzz/issues/143
security.gentoo.org/glsa/201701-76
7.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P