Staying Safe in Times of Cyber Uncertainty
Check Point Advisories

Portable Executable (PE) 16-bit File

Check Point Reference: CPAI-2011-124
Date Published: 11 Oct 2011
Severity: High
Last Updated: Saturday 01 January, 2011
Source: Microsoft Security Bulletin MS11-077
Industry Reference:CVE-2011-2003
Protection Provided by:
Who is Vulnerable? Windows XP SP3
Windows Vista SP2
Windows 7 SP1
Windows Server 2003 SP2
Windows Server 2008 R2
Vulnerability Description A buffer overflow vulnerability has been reported in Microsoft Windows kernel.
Update/Patch AvaliableMS11-077
Vulnerability DetailsThe vulnerability is due to insufficient data validation when processing specially crafted legacy font files (.fon). A remote attacker may exploit this vulnerability by enticing an unsuspecting user to open a malicious font file from a WebDAV or an SMB share. Successful exploitation may allow an attacker to take complete control of an affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK