A heap-based buffer overflow in the way Microsoft Windows processes embedded web fonts may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Microsoft Windows contains a heap-based buffer overflow in a routine that processes embedded web fonts. The overflow exists due to a lack of validation on compressed embedded web fonts. A remote attacker may be able to trigger the buffer overflow by persuading a user to access a web page or HTML email containing a specially crafted embedded web font.
For more information about affected versions of Microsoft Windows, please refer to MS06-002.
A remote attacker may be able to execute arbitrary code with the privileges of the attacked user account.
Apply an update
Microsoft Security Bulletin MS06-002 contains an update to correct this vulnerability.
In addition Microsoft suggests the following workarounds to mitigate this vulnerability:
* Read and send email in plain text format * Configure Font Download to “Prompt or Disable” in the Internet and Local Intranet Zones.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Updated: January 10, 2006
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.microsoft.com/technet/security/bulletin/ms06-002.mspx>
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
This vulnerability was reported in Microsoft Security Bulletin MS06-002. Microsoft credits eEye Digital Security with providing information regarding this issue.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-0010
Severity Metric: | 10.69
Date Public: | 2006-01-10
Date First Published: | 2006-01-10
Date Last Updated: | 2006-01-10 20:31 UTC
Document Revision: | 34