Vulnerability Description
SkPath.cpp in Skia, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, does not properly validate the return values of ChopMonoAtY calls, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via crafted graphics data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | <= 52.0.2743.116 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2016/dsa-3667
- http://www.securityfocus.com/bid/92717
- https://codereview.chromium.org/2006143009
- https://crbug.com/613918
- https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desk
- http://www.debian.org/security/2016/dsa-3667
- http://www.securityfocus.com/bid/92717
- https://codereview.chromium.org/2006143009
- https://crbug.com/613918
- https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desk
FAQ
What is CVE-2016-7395?
CVE-2016-7395 is a vulnerability with a CVSS score of 8.8 (HIGH). SkPath.cpp in Skia, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, does not properly validate the return values of ChopMonoAtY calls, which allows r...
How severe is CVE-2016-7395?
CVE-2016-7395 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7395?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome.