Check Point Advisories

Preemptive Protection against Microsoft Windows Fax Cover Page Editor Memory Corruption Vulnerability (MS11-024)

Check Point Reference: CPAI-2011-213
Date Published: 12 Apr 2011
Severity: High
Last Updated: Saturday 01 January, 2011
Source: Microsoft Security Bulletin MS11-024
Industry Reference:CVE-2010-3974
Protection Provided by:
Who is Vulnerable? Windows XP SP3  Windows XP Professional x64 Edition SP2 Windows Server 2003 SP2 Windows Server 2003 x64 Edition SP2 Windows Server 2003 with SP2 (Itanium) Windows Vista SP1 Windows Vista SP2 Windows Vista x64 Edition SP1 Windows Vista x64 Edition SP2 Windows Server 2008 for 32-bit Systems Windows Server 2008 for 32-bit Systems SP2 Windows Server 2008 for 32-bit Systems Windows Server 2008 for 32-bit Systems SP2 Windows Server 2008 for x64-based Systems Windows Server 2008 for x64-based Systems SP2 Windows Server 2008 for x64-based Systems Windows Server 2008 for x64-based Systems SP2 Windows Server 2008 (Itanium) Windows Server 2008 (Itanium) SP2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems SP1 Windows 7 for x64-based Systems Windows 7 for x64-based Systems SP1 Windows Server 2008 R2 for x64-based Systems Windows Server 2008 R2 for x64-based Systems SP1 Windows Server 2008 R2 for x64-based Systems Windows Server 2008 R2 for x64-based Systems SP1 Windows Server 2008 R2 (Itanium) Windows Server 2008 R2 (Itanium) SP1
Vulnerability Description A remote code execution vulnerability in the way that the Windows Fax Cover Page Editor improperly parses specially crafted fax cover pages. The Fax Cover Page Editor (fxscover.exe) application can be used to create and edit fax cover pages. A remote attacker may exploit this vulnerability to execute arbitrary code on a target system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS11-024 
Vulnerability DetailsThe vulnerability is due to a memory corruption error in the Windows Fax Cover Page Editor the fails to properly parse specially crafted fax cover pages. A remote attacker may exploit this issue by enticing the target user to open a specially crafted fax cover page file. Successful exploitation of this vulnerability could result in execution of arbitrary code on the target system, and may terminate the affected application abnormally.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK