This host is missing an important security update for Microsoft Windows Multiple Vulnerabilities (KB4048968). The vulnerabilities exist due to the way the Microsoft Windows Embedded OpenType (EOT) font engine parses embedded fonts, and can potentially allow an attacker to read unintended data
Reporter | Title | Published | Views | Family All 28 |
---|---|---|---|---|
![]() | CVE-2017-11835 | 15 Nov 201703:29 | â | nvd |
![]() | CVE-2017-11832 | 15 Nov 201703:29 | â | nvd |
![]() | CVE-2017-11832 | 15 Nov 201703:29 | â | cve |
![]() | CVE-2017-11835 | 15 Nov 201703:29 | â | cve |
![]() | CVE-2017-11832 | 15 Nov 201703:00 | â | cvelist |
![]() | CVE-2017-11835 | 15 Nov 201703:00 | â | cvelist |
![]() | Description of the security update for the Windows EOT font engine information disclosure vulnerability in Windows Server 2008: November 14, 2017 | 14 Nov 201708:00 | â | mskb |
![]() | November 14, 2017âKB4048960 (Security-only update) | 14 Nov 201708:00 | â | mskb |
![]() | November 14, 2017âKB4048957 (Monthly Rollup) | 14 Nov 201708:00 | â | mskb |
![]() | November 14, 2017âKB4048962 (Security-only update) | 14 Nov 201708:00 | â | mskb |
Source | Link |
---|---|
support | www.support.microsoft.com/en-us/help/4048968 |
securityfocus | www.securityfocus.com/bid/101736 |
securityfocus | www.securityfocus.com/bid/101726 |
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.812126");
script_version("2023-07-25T05:05:58+0000");
script_cve_id("CVE-2017-11835", "CVE-2017-11832");
script_tag(name:"cvss_base", value:"2.1");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:N/A:N");
script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2017-11-30 19:44:00 +0000 (Thu, 30 Nov 2017)");
script_tag(name:"creation_date", value:"2017-11-15 00:30:17 +0530 (Wed, 15 Nov 2017)");
script_name("Microsoft Windows Multiple Vulnerabilities (KB4048968)");
script_tag(name:"summary", value:"This host is missing an important security
update according to Microsoft KB4048968");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to the way that the
Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted
embedded fonts.");
script_tag(name:"impact", value:"Successful exploitation will allow an attacker
to potentially read data that was not intended to be disclosed.");
script_tag(name:"affected", value:"Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2.");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4048968");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101736");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101726");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Windows : Microsoft Bulletins");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win2008:3, win2008x64:3) <= 0){
exit(0);
}
sysPath = smb_get_system32root();
if(!sysPath ){
exit(0);
}
fileVer = fetch_file_version(sysPath:sysPath, file_name:"t2embed.dll");
if(!fileVer){
exit(0);
}
if(version_is_less(version:fileVer, test_version:"6.0.6002.24215"))
{
report = report_fixed_ver(file_checked:sysPath + "\t2embed.dll",
file_version:fileVer, vulnerable_range:"Less than 6.0.6002.24215");
security_message(data:report);
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo