CVE-2015-2426
KEV
🔴 Łataj teraz
Przepełnienie bufora w atmfd.dll umożliwia zdalne wykonanie kodu przez złośliwy font.
CVSS
8.8
EPSS
91.8%
Exploit
weaponized
Vendor
microsoft
Opis źródłowy (NVD)
Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "OpenType Font Driver Vulnerability."
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 91.8% |
| Opublikowano (NVD) | 2015-07-20 18:59:01 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 16:43:44 UTC |
Referencje
- http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/ (secure@microsoft.com) [Exploit, Third Party Advisory]
- http://www.kb.cert.org/vuls/id/103336 (secure@microsoft.com) [Third Party Advisory, US Government Resource]
- http://www.securityfocus.com/bid/75951 (secure@microsoft.com) [Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1032991 (secure@microsoft.com) [Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-078 (secure@microsoft.com) [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/38222/ (secure@microsoft.com) [Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-2426 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]