Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2020-15999
Analyzed
Known KEV
More InfoOfficial Page
Source-chrome-cve-admin@google.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Nov, 2020 | 03:15
Updated At-05 Feb, 2025 | 14:37

Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2021-11-032021-11-17Google Chrome FreeType Heap Buffer Overflow VulnerabilityApply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.6CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Secondary3.19.6CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

Google LLC
google
>>chrome>>Versions before 86.0.4240.111(exclusive)
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
freetype
freetype
>>freetype>>Versions from 2.6.0(inclusive) to 2.10.4(exclusive)
cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>31
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
openSUSE
opensuse
>>backports_sle>>15.0
cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
NetApp, Inc.
netapp
>>ontap_select_deploy_administration_utility>>-
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE-120Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.htmlchrome-cve-admin@google.com
Broken Link
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/33chrome-cve-admin@google.com
Mailing List
Not Applicable
Third Party Advisory
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.htmlchrome-cve-admin@google.com
Third Party Advisory
https://crbug.com/1139963chrome-cve-admin@google.com
Exploit
Issue Tracking
Third Party Advisory
https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.htmlchrome-cve-admin@google.com
Exploit
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/chrome-cve-admin@google.com
Release Notes
https://security.gentoo.org/glsa/202011-12chrome-cve-admin@google.com
Third Party Advisory
https://security.gentoo.org/glsa/202012-04chrome-cve-admin@google.com
Third Party Advisory
https://security.gentoo.org/glsa/202401-19chrome-cve-admin@google.com
Third Party Advisory
https://www.debian.org/security/2021/dsa-4824chrome-cve-admin@google.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/33af854a3a-2127-422b-91ae-364da2661108
Mailing List
Not Applicable
Third Party Advisory
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://crbug.com/1139963af854a3a-2127-422b-91ae-364da2661108
Exploit
Issue Tracking
Third Party Advisory
https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://security.gentoo.org/glsa/202011-12af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/202012-04af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/202401-19af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240812-0001/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2021/dsa-4824af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
Change History
0Changes found

Details not found