Lucene search

K
zdiAlin Rad Pop (binaryproof)ZDI-12-129
HistoryAug 03, 2012 - 12:00 a.m.

Microsoft Windows TrueType Font Parsing Remote Code Execution Vulnerability (Remote Kernel)

2012-08-0300:00:00
Alin Rad Pop (binaryproof)
www.zerodayinitiative.com
15

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.641 Medium

EPSS

Percentile

97.8%

This vulnerability allows remote attackers to execute arbitrary code from the contact of kernelspace on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the kernel’s support for TrueType font parsing of compound glyphs. A sign extension error exists in win32k.sys when processing compound glyphs having a total number of contours above 0x7FFF. This can be exploited to corrupt kernel heap memory placed below the space allocated for the β€œflags” buffer and potentially execute arbitrary code in kernel space.

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.641 Medium

EPSS

Percentile

97.8%