Microsoft Windows 'Win32k.sys' TrueType Font Handling Remote Code Execution Vulnerability
Publish Date: 21 lipca 2015
Severity: : Critical
CVE Kennungen: : CVE-2011-3402
Advisory Date: 21 lipca 2015
DESCRIPTION
Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability."
INFORMATION EXPOSURE
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1004855
Trend Micro Deep Security DPI Rule Name: 1004855 - Identified EOT File With Embedded TrueType Font File
AFFECTED SOFTWARE AND VERSION:
- microsoft windows_7 -
- microsoft windows_server_2003
- microsoft windows_server_2008
- microsoft windows_server_2008 -
- microsoft windows_server_2008 r2
- microsoft windows_vista
- microsoft windows_xp