Vulnerability Description
Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than CVE-2015-8947.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Harfbuzz Project | Harfbuzz | <= 1.0.5 |
| Chrome | <= 47.0.2526.106 |
References
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html
- http://rhn.redhat.com/errata/RHSA-2016-0072.html
- http://www.securityfocus.com/bid/81812
- http://www.securitytracker.com/id/1034801
- http://www.ubuntu.com/usn/USN-2877-1
- http://www.ubuntu.com/usn/USN-3067-1
- https://code.google.com/p/chromium/issues/detail?id=544270
- https://code.google.com/p/chromium/issues/detail?id=579625
- https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90ad
- https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957
- https://security.gentoo.org/glsa/201701-76
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html
- http://rhn.redhat.com/errata/RHSA-2016-0072.html
FAQ
What is CVE-2016-2052?
CVE-2016-2052 is a vulnerability with a CVSS score of 7.6 (HIGH). Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data...
How severe is CVE-2016-2052?
CVE-2016-2052 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2052?
Check the references section above for vendor advisories and patch information. Affected products include: Harfbuzz Project Harfbuzz, Google Chrome.