⚠ Actively exploited
Added to CISA KEV on 2022-05-25. Federal agencies required to patch by 2022-06-15. Required action: Apply updates per vendor instructions..

CVE-2015-1671

CWE-195 documents5 sources
Severity
7.8HIGH
EPSS
85.9%
top 0.61%
CISA KEV
KEV
Added 2022-05-25
Due 2022-06-15
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMay 13
KEV addedMay 25
KEV dueJun 15
CISA Required Action: Apply updates per vendor instructions.

Description

The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDmicrosoft/lync2010, 2013+1
NVDmicrosoft/.net_framework7 versions+6

Patches

🔴Vulnerability Details

3
GHSA
GHSA-gr4p-px5x-x8jm: The Windows DirectWrite library, as used in Microsoft2022-05-14
CVEList
CVE-2015-1671: The Windows DirectWrite library, as used in Microsoft2015-05-13
VulnCheck
Microsoft Windows Remote Code Execution Vulnerability2015

📋Vendor Advisories

1
CISA
Microsoft Windows Remote Code Execution Vulnerability2022-05-25
CVE-2015-1671 (HIGH CVSS 7.8) | The Windows DirectWrite library | cvebase.io