9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.889 High
EPSS
Percentile
98.8%
Microsoft Windows contains a buffer overflow vulnerability in the handling of font library files, which may allow a remote, unauthenticated attacker to execute arbitrary code with kernel privileges.
Microsoft Windows supports a variety of font formats. One of which is the font library file format, which have the file extension of .FON
. Rendering of font library files takes place in the Windows GDI (Graphics Device Interface), which is part of the Windows kernel-mode driver win32k.sys
. Microsoft Windows contains a buffer overflow in the handling of font library files.
By convincing a user to open a specially-crafted font library file, a remote, unauthenticated attacker could execute arbitrary code with kernel privileges. A local use could also gain elevated privileges.
Apply an update
This issue is addressed in Microsoft Security Bulletin MS11-077.
619281
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: June 10, 2011 Updated: October 11, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 9 | AV:N/AC:M/Au:N/C:C/I:C/A:P |
Temporal | 7 | E:POC/RL:OF/RC:C |
Environmental | 7 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
This issue was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
CVE IDs: | CVE-2011-2003 |
---|---|
Severity Metric: | 9.49 Date Public: |