SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015459
SecurityTracker URL:  http://securitytracker.com/id/1015459
CVE Reference:   CVE-2006-0010   (Links to External Site)
Date:  Jan 10 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 98, 2000 SP4, XP SP2, 2003 SP1; and prior service packs
Description:   A vulnerability was reported in Microsoft Windows in the processing of web fonts. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted embedded web fonts that, when viewed by the target user, will trigger a buffer overflow and execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

The vulnerability can be exploited via web pages and HTML-based e-mail.

Microsoft credits eEye Digital Security with reporting this vulnerability.

Impact:   A remote user can cause arbitrary code to be executed on the target user's system with the privileges of the target user.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=DC6C2FE8-3C81-4661-994B-4146775BF590

Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=6DAEA2AF-3723-4CDF-B5BD-B21AC75B5243

Microsoft Windows XP Professional x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=1990B2CF-AE88-4849-AEAB-3F833969E197

Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=5FC12654-486F-45BF-8D34-BDF0998869C5

Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=E39D2E29-8934-4AA1-844D-11EFA57D9CC5

Microsoft Windows Server 2003 x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=80B05C56-5BCE-4262-8142-AF0D8A7BC388

A restart may be required.

Vendor URL:  www.microsoft.com/technet/security/Bulletin/MS06-002.mspx (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC