[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

TrueType Font Parsing Vulnerability in Microsoft Office, Windows, .NET Framework, and Silverlight

ID: oval:org.secpod.oval:def:5627Date: (C)2012-05-12   (M)2024-04-08
Class: VULNERABILITYFamily: windows




The host is installed with Microsoft Office, Windows, .NET Framework, and Silverlight and is prone TrueType Font parsing vulnerability. A flaw is present in the applications, which fail to handle a specially crafted TrueType font file. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.

Platform:
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows Server 2003
Microsoft Windows 10
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product:
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4
Microsoft Office 2003
Microsoft Office 2007
Microsoft Office 2010
Microsoft Silverlight 4
Microsoft Silverlight 5
Microsoft Lync 2010
Microsoft Lync 2010 Attendee
Reference:
CVE-2011-3402
CVE    1
CVE-2011-3402
CPE    50
cpe:/o:microsoft:windows_server_2008:r2:sp1:x64
cpe:/o:microsoft:windows_server_2008:::x86
cpe:/o:microsoft:windows_7::sp1:x86
cpe:/o:microsoft:windows_xp::sp3:x86
...

© SecPod Technologies