Lucene search

K
symantecSymantec Security ResponseSMNTC-23276
HistoryApr 03, 2007 - 12:00 a.m.

Microsoft Windows Graphics Device Interface Font Rasterizer Local Privilege Escalation Vulnerability

2007-04-0300:00:00
Symantec Security Response
www.symantec.com
7

Description

Microsoft Windows GDI Font Rasterizer is prone to a local privilege-escalation vulnerability. An attacker can exploit this issue to gain complete control of an affected computer. Failed attempts will likely cause the operating system to crash, resulting in denial-of-service conditions.

Technologies Affected

  • Avaya Customer Interaction Express (CIE) Server 1.0
  • Avaya Customer Interaction Express (CIE) User Interface 1.0
  • Avaya Messaging Application Server
  • Avaya Messaging Application Server MM 2.0
  • Avaya Messaging Application Server MM 3.0
  • Avaya Messaging Application Server MM 3.1
  • HP Storage Management Appliance 2.1
  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows 2000 Advanced Server SP1
  • Microsoft Windows 2000 Advanced Server SP2
  • Microsoft Windows 2000 Advanced Server SP3
  • Microsoft Windows 2000 Advanced Server SP4
  • Microsoft Windows 2000 Datacenter Server
  • Microsoft Windows 2000 Datacenter Server SP1
  • Microsoft Windows 2000 Datacenter Server SP2
  • Microsoft Windows 2000 Datacenter Server SP3
  • Microsoft Windows 2000 Datacenter Server SP4
  • Microsoft Windows 2000 Professional
  • Microsoft Windows 2000 Professional SP1
  • Microsoft Windows 2000 Professional SP2
  • Microsoft Windows 2000 Professional SP3
  • Microsoft Windows 2000 Professional SP4
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Server SP1
  • Microsoft Windows 2000 Server SP2
  • Microsoft Windows 2000 Server SP3
  • Microsoft Windows 2000 Server SP4
  • Nortel Networks CallPilot 200i
  • Nortel Networks CallPilot 201i
  • Nortel Networks CallPilot 702t
  • Nortel Networks CallPilot 703t
  • Nortel Networks Centrex IP Element Manager 7.0.0
  • Nortel Networks Centrex IP Element Manager 8.0.0
  • Nortel Networks Centrex IP Element Manager 9.0.0
  • Nortel Networks Contact Center - Agent Desktop Display
  • Nortel Networks Contact Center - TAPI Server
  • Nortel Networks Contact Center Administration
  • Nortel Networks Contact Center Express
  • Nortel Networks Contact Center Manager
  • Nortel Networks Contact Center Manager Server
  • Nortel Networks Enterprise Network Management System
  • Nortel Networks Meridian SL-100
  • Nortel Networks Multimedia Communication Platform
  • Nortel Networks Self-Service - Web Centric CCXML
  • Nortel Networks Self-Service
  • Nortel Networks Self-Service MPS 100
  • Nortel Networks Self-Service MPS 1000
  • Nortel Networks Self-Service MPS 500
  • Nortel Networks Self-Service Media Processing Server
  • Nortel Networks Self-Service Peri Application
  • Nortel Networks Self-Service Peri IVR
  • Nortel Networks Self-Service Peri NT Server
  • Nortel Networks Self-Service Speech Server

Recommendations

Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Permitting local access to trusted individuals only will greatly reduce the likelihood of attacks.

Microsoft has released an advisory and patches to address this issue. Please see the references for more information.