Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-3956 | First vendor Publication | 2010-12-16 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly perform array indexing, which allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Index Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3956 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12357 | |||
Oval ID: | oval:org.mitre.oval:def:12357 | ||
Title: | OpenType Font Index Vulnerability | ||
Description: | The OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly perform array indexing, which allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Index Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-3956 | Version: | 6 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2010-12-15 | Name : Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vu... File : nvt/secpod_ms10-091.nasl |
2010-12-15 | Name : Routing and Remote Access Privilege Escalation Vulnerability (2440591) File : nvt/secpod_ms10-099.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69820 | Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution Microsoft Windows contains an array indexation flaw related to the OpenType Font driver. The issue is triggered when a context-dependent attacker uses a specially crafted OpenType font to corrupt memory. This may allow the execution of arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-05 | Microsoft OpenType font index remote code execution attempt RuleID : 50889 - Revision : 1 - Type : FILE-OTHER |
2019-09-05 | Microsoft OpenType font index remote code execution attempt RuleID : 50888 - Revision : 1 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows ATMFD font driver remote code execution attempt RuleID : 19119 - Revision : 11 - Type : OS-WINDOWS |
2014-01-10 | Microsoft OpenType font index remote code execution attempt RuleID : 19064 - Revision : 15 - Type : FILE-OTHER |
2014-01-10 | Microsoft Office Publisher Adobe Font Driver code execution attempt RuleID : 18233 - Revision : 16 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Windows ATMFD font driver malformed character glyph remote code exe... RuleID : 18220 - Revision : 10 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows ATMFD font driver remote code execution attempt RuleID : 18219 - Revision : 16 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-12-15 | Name : The remote Windows host contains a font driver that allows arbitrary code exe... File : smb_nt_ms10-091.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:06:42 |
|
2024-11-28 12:23:21 |
|
2023-12-07 21:28:03 |
|
2021-05-04 12:12:45 |
|
2021-04-22 01:13:21 |
|
2020-05-23 00:26:46 |
|
2019-02-26 17:19:34 |
|
2018-10-31 00:20:08 |
|
2018-10-13 00:23:01 |
|
2017-09-19 09:24:02 |
|
2016-08-31 12:02:19 |
|
2016-08-05 12:02:40 |
|
2016-06-28 18:21:25 |
|
2016-04-26 20:11:11 |
|
2014-02-17 10:58:15 |
|
2014-01-19 21:27:14 |
|
2013-05-10 23:35:34 |
|