9.3
CVSSv2

CVE-2015-2455

Published: 15/08/2015 Updated: 15/05/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight prior to 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote malicious users to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2456.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft .net_framework 4.5.2

microsoft .net_framework 3.0

microsoft .net_framework 4.0

microsoft .net_framework 4.5

microsoft .net_framework 4.5.1

microsoft .net_framework 4.6

microsoft .net_framework 3.5.1

microsoft .net_framework 3.5

microsoft lync 2010

microsoft office 2010

microsoft silverlight

microsoft lync basic 2013

microsoft lync 2013

microsoft office 2007

microsoft live meeting 2007

microsoft windows server 2008 -

microsoft windows server 2008 r2

microsoft windows rt 8.1 -

microsoft windows 8 -

microsoft windows 8.1 -

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows 10 -

microsoft windows vista -

microsoft windows 7 -

microsoft windows rt -

Exploits

Source: codegooglecom/p/google-security-research/issues/detail?id=368&can=1 We have encountered a number of Windows kernel crashes in the win32k!itrp_IUP function (a handler of the IUP[] TTF program instruction) while processing corrupted TTF font files, such as: --- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referen ...

Github Repositories

TrueType and OpenType font fuzzing toolset

BrokenType BrokenType is a set of tools designed to test the robustness and security of font rasterization software, especially codebases prone to memory corruption issues (written in C/C++ and similar languages) It consists of the following components: TrueType program generator - a Python script for generating random, but valid TrueType programs TTF/OTF mutator - a semi-&q