[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

133467

 
 

909

 
 

108562

 
 

152

Paid content will be excluded from the download.


Download | Alert*
OVAL

Remote Code Execution Vulnerability in the Embedded OpenType Font Engine - MS10-001

ID: oval:org.secpod.oval:def:1224Date: (C)2011-06-20   (M)2019-10-07
Class: PATCHFamily: windows




The host is missing a Critical security update according to Microsoft security bulletin, MS10-001. The update is required to fix remote code execution vulnerability. A flaw is present in the OpenType (EOT) Font Client which fails to properly parse specially crafted EOT fonts. Successful exploitation allows an attacker to run arbitrary code in kernel mode and hence install programs, view, change, or delete data or create new accounts with full user rights.

Platform:
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Reference:
MS10-001
CVE-2010-0018
CVE    1
CVE-2010-0018
CPE    33
cpe:/o:microsoft:windows_xp::sp2:x86
cpe:/o:microsoft:windows_vista::sp1:x64
cpe:/o:microsoft:windows_7:-:-:x32
cpe:/o:microsoft:windows_server_2008:::x32
...
XCCDF    9
xccdf_com.secpod_benchmark_microsoft-windows-server-2008
xccdf_com.secpod_benchmark_microsoft-windows-server-2003
xccdf_com.secpod_benchmark_microsoft-windows-7
xccdf_com.secpod_benchmark_microsoft-windows-2000
...

© SecPod Technologies