Executive Summary
Summary | |
---|---|
Title | Windows Adobe Type Manager privilege escalation vulnerability |
Informations | |||
---|---|---|---|
Name | VU#103336 | First vendor Publication | 2015-07-08 |
Vendor | VU-CERT | Last vendor Modification | 2015-07-14 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#103336Windows Adobe Type Manager privilege escalation vulnerabilityOverviewThe Adobe Type Manager module contains a memory corruption vulnerability, which can allow an attacker to obtain SYSTEM privileges on an affected Windows system. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThis document was written by Will Dormann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/103336 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 3 | |
Os | 2 | |
Os | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-08-20 | Microsoft Windows ATMFD kernel pool overflow attempt RuleID : 35305 - Revision : 3 - Type : FILE-OTHER |
2015-08-20 | Microsoft Windows ATMFD kernel pool overflow attempt RuleID : 35304 - Revision : 3 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-07-20 | Name : The remote Windows host is affected by a remote code execution vulnerability. File : smb_nt_ms15-078.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-07-21 21:32:32 |
|
2015-07-21 05:28:21 |
|
2015-07-15 00:25:48 |
|
2015-07-09 21:25:22 |
|
2015-07-09 00:25:22 |
|
2015-07-08 21:25:51 |
|