Executive Summary
Summary | |
---|---|
Title | Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2507618) |
Informations | |||
---|---|---|---|
Name | MS11-032 | First vendor Publication | 2011-04-12 |
Vendor | Microsoft | Last vendor Modification | 2011-04-12 |
Severity (Vendor) | Critical | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.0 (April 12, 2011): Bulletin published.Summary: This security update resolves a privately reported vulnerability in the OpenType Compact Font Format (CFF) driver. The vulnerability could allow remote code execution if a user views content rendered in a specially crafted CFF font. In all cases, an attacker would have no way to force users to view the specially crafted content. Instead, an attacker would have to convince users to visit a Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS11-032.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-04-13 | Name : Windows OpenType Compact Font Format (CFF) Driver Remote Code Execution Vulne... File : nvt/secpod_ms11-032.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
71776 | Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow Microsoft Windows is prone to an overflow condition. The OpenType Compact Font Format driver fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With specially crafted parameter values in an OpenType font, a context-dependent attacker can potentially execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows OpenType font parsing stack overflow attempt RuleID : 20904 - Revision : 10 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows OpenType font parsing stack overflow attempt RuleID : 20903 - Revision : 13 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows OpenType font parsing stack overflow attempt RuleID : 20902 - Revision : 10 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows OpenType Fonts CompactFontFormat FontMatrix tranform memory... RuleID : 18644 - Revision : 11 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-04-13 | Name : The remote Windows host contains a font driver that is affected by a privileg... File : smb_nt_ms11-032.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:57 |
|
2014-01-19 21:30:40 |
|
2013-05-11 00:49:49 |
|