SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows OpenType Compact Font Format Bug Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1025034
SecurityTracker URL:  http://securitytracker.com/id/1025034
CVE Reference:   CVE-2011-0033   (Links to External Site)
Updated:  Mar 9 2011
Original Entry Date:  Feb 8 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): XP SP3, 2003 SP2, Vista SP2, 2008 SP2, 7, 2008 R2; and prior service packs
Description:   A vulnerability was reported in Windows OpenType Compact Font Format. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create content containing a specially crafted Compact Font Format (CFF) font that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Windows XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=F86E9E64-801A-431A-B24E-772011DFA66D

Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=074396F0-A68C-4190-8DAC-0B883D56E3F1

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=A99C2B13-DB81-4F18-9CF7-C20614BA0132

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=AEED45FB-9395-4C2B-A674-E38B04FE0914

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=BC09E42B-2EED-41B3-A03F-CB8CC94ADFEE

Windows Vista Service Pack 1 and Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=D60A2098-7351-4FCE-83B2-2C1C3A24FAA0

Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=065AD8FE-1CAF-488E-A2E1-96DB29F2FA57

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=88BA83B9-C14E-499A-8335-04BAC1C49C0C

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=7C74D7F4-6372-4809-89B8-C79B05E54CDD

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=91D5D34B-9D7E-4E83-89A4-F1AA388DC4E4

Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=1DA57FBC-9EA4-4FC4-911D-D5C7825E012C

Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=587ADB89-2F6A-4893-9906-B6D6D9ADA2BD

Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=638318ED-4000-4B1A-BB4B-65B795F59784

Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=4688EA0D-A467-4F24-AC52-104D05C8CAE8

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms11-007.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms11-007.mspx (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC