SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows DLL (Any) Vendors:   Microsoft
Windows OpenType Font Driver Memory Corruption Flaws Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1024873
SecurityTracker URL:  http://securitytracker.com/id/1024873
CVE Reference:   CVE-2010-3956, CVE-2010-3957, CVE-2010-3959   (Links to External Site)
Date:  Dec 14 2010
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): XP SP3, 2003 SP2, Vista SP2, 2008 SP2, 7, 2008 R2; and prior service packs
Description:   Several vulnerabilities were reported in the Windows OpenType Font Driver. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted OpenType font file on a network share. When the target user navigates to the share via Windows Explorer, arbitrary code will be executed on the target user's system. The code will run with the privileges of the target user.

Marc Schoenefeld of the Red Hat Security Response Team (and working with the Opera Security Team) and Paul-Kenji Cahier Furuya reported these vulnerabilities.

Impact:   A remote user can create a file that, when navigated via Windows Explorer by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Windows XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=CDEF3358-AD3E-40A6-9BA5-3BE220A56A65

Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=070FEF8E-BA09-40F4-ABAA-9CEBF08983C3

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=9B70334C-490D-446C-988A-A88A75595FD4

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=08328E82-B012-4EA5-BF89-BECB4881084F

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=15588D6A-F576-4E3D-95E8-D422AF8A94DE

Windows Vista Service Pack 1 and Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=2DDB8A06-C9CC-4D33-B6D1-22DBDA2D871F

Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=9A245F3C-FFB6-4CCD-956C-E7D1231FCA30

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=87149EC2-74A8-4DEA-B7E3-873558E0103E

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=523A47D3-771D-471A-889B-16311C276A00

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=959146EE-0E70-4E56-9012-72ED59AEB24B

Windows 7 for 32-bit Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=FF590DB8-4264-42BA-9E07-88D100E1C4F5

Windows 7 for x64-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=4EA4E339-9DB2-4B99-B567-80EE55ECDF92

Windows Server 2008 R2 for x64-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=E52F7869-474A-44C8-A102-E766C576FC01

Windows Server 2008 R2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=A21D061A-794A-4012-B3CD-C67445C074F5

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms10-091.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms10-091.mspx (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC