Description
Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.
References (10)
Core 10
Core References
Issue Tracking x_refsource_confirm
https://code.google.com/p/chromium/issues/detail?id=497302
Release Notes, Vendor Advisory x_refsource_confirm
http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
Patch x_refsource_confirm
https://github.com/googlei18n/sfntly/commit/de776d4ef06ca29c240de3444348894f032b03ff
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201603-09
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/78416
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3415
Patch x_refsource_confirm
https://codereview.chromium.org/1367323002/
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1034298
Scores
EPSS
0.0171
EPSS Percentile
82.5%
Details
CWE
CWE-189
Status
published
Products (1)
google/chrome
< 46.0.2490.86
Published
Dec 06, 2015
Tracked Since
Feb 18, 2026