Check Point Advisories

Workaround for Microsoft Windows Kernel-Mode Drivers Win32k EOT Parsing Remote Code Execution Vulnerability (MS09-065)

Check Point Reference: SBP-2009-21
Date Published: 10 Nov 2009
Severity: Critical
Last Updated: Thursday 01 January, 2009
Source: Microsoft Security Bulletin MS09-065
Industry Reference:CVE-2009-2514
Protection Provided by:
Who is Vulnerable? Microsoft Windows 2000 SP4
Windows XP SP2
Windows XP SP3
Windows XP Professional x64 Edition SP2
Windows Server 2003 SP2
Windows Server 2003 x64 Edition SP2
Windows Server 2003 with SP2 (Itanium)
Vulnerability Description A remote code execution vulnerability has been reported in the way the Windows kernel-mode drivers are parsing Windows Embedded OpenType (EOT) font code. The Windows kernel is the core of the operating system. It provides system level services such as device management and memory management, allocates processor time to processes, and manages error handling. EOT fonts are a compact form of fonts designed for use on web pages. A remote attacker can exploit this vulnerability via a specially crafted EOT file. Successful exploitation may allow execution of arbitrary code on a vulnerable system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS09-065
Vulnerability DetailsThe vulnerability is due to an error in the Windows kernel-mode drivers that fail to properly parse font code when building a table of directory entries. A remote attacker may exploit this issue via a malformed EOT file. Successful exploitation of this issue allows execution of arbitrary code once the malformed file is being opened or previewed on an affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK