CVE-2015-1671
KEV
🔴 Łataj teraz
Wykorzystanie podatności w bibliotece DirectWrite umożliwia zdalne wykonanie kodu.
CVSS
7.8
EPSS
85.9%
Exploit
weaponized
Vendor
microsoft
Opis źródłowy (NVD)
The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 85.9% |
| Opublikowano (NVD) | 2015-05-13 10:59:03 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 16:31:15 UTC |
Referencje
- http://www.securityfocus.com/bid/74490 (secure@microsoft.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1032281 (secure@microsoft.com) [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-044 (secure@microsoft.com) [Patch, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-1671 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]