CVE-2020-15999

ADVISORY - github

Summary

Impact

A memory corruption bug(Heap overflow) in the FreeType font rendering library.

This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .

As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/

Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.

Patches

Upgrade to 85.3.130 or higher

References

To review the CEF/Chromium patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d

EPSS Score: 0.92732 (0.997)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Out-of-bounds Write

ADVISORY - github

Improper Restriction of Operations within the Bounds of a Memory Buffer

Out-of-bounds Write

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Improper Restriction of Operations within the Bounds of a Memory Buffer

Out-of-bounds Write

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Heap-based Buffer Overflow

Integer Overflow or Wraparound


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in