CERT-In Vulnerability Note
CIVN-2011-0174
Microsoft Windows True Type Font Parsing Denial of Service Vulnerability
Original Issue Date:November 09, 2011
Severity Rating: MEDIUM
Systems Affected
- Windows 7 for 32-bit Systems SP1 and prior
- Windows 7 for x64-based Systems SP1 and prior
- Windows Server 2008 R2 for x64-based Systems SP1 and prior [Server Core installation not affected]
- Windows Server 2008 R2 for Itanium-based Systems SP1 and prior
Overview
A vulnerability have been reported in Microsoft Windows Kernel, which could be exploited by remote attacker to cause a Denial of Service (DoS) condition on a targeted system.
Description
The vulnerability is caused due to improper processing of malformed TrueType font files. This vulnerability could be exploited by the remote attacker to convince a user to view a specially-crafted TrueType font file and resulting an error condition in the Windows kernel, causing the system to fail and restart.
Successful exploitation of this vulnerability could allow the remote attacker to stop responding and restart the system, cause Denial of Service (DoS) condition on a targeted system.
Workaround
- Disable the WebClient service.
- Block TCP ports 139 and 445 at the firewall.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS11-084
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms11-084
References
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms11-084
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=24491
Xforce
http://xforce.iss.net/xforce/xfdb/70946
CVE Name
CVE-2011-2004
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|