CVE-2011-2825
Webkit fontface Invalid Font Family Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving custom fonts.
Vulnerabilidad de uso después de la liberación en Google Chrome v13.0.782.215, permite a atacantes remotos producir una denegación de servicio (caída de aplicación) o posiblemente ejecutar código arbitrario mediante las fuentes personalizadas.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing and utilization of font objects. When the code parses the @font-face CSS element it does not validate that the font-family is legitimate. Later, if the same font-family is applied within CSS the code will access an invalid element of its internal font object. This can be leveraged by a remote attacker to execute code under the context of the user running the browser.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-07-20 CVE Reserved
- 2011-08-29 CVE Published
- 2024-08-06 CVE Updated
- 2024-09-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://code.google.com/p/chromium/issues/detail?id=88670 | X_refsource_confirm | |
http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html | X_refsource_confirm | |
http://secunia.com/advisories/48274 | Third Party Advisory | |
http://secunia.com/advisories/48288 | Third Party Advisory | |
http://secunia.com/advisories/48377 | Third Party Advisory | |
http://www.securitytracker.com/id?1026774 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14421 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 13.0.782.215 Search vendor "Google" for product "Chrome" and version " < 13.0.782.215" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Itunes Search vendor "Apple" for product "Itunes" | < 10.6 Search vendor "Apple" for product "Itunes" and version " < 10.6" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Safari Search vendor "Apple" for product "Safari" | < 5.1.4 Search vendor "Apple" for product "Safari" and version " < 5.1.4" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | < 5.1 Search vendor "Apple" for product "Iphone Os" and version " < 5.1" | - |
Affected
|