Check Point Reference: | SBP-2009-21 |
Date Published: | 10 Nov 2009 |
Severity: | Critical |
Last Updated: | Thursday 01 January, 2009 |
Source: | Microsoft Security Bulletin MS09-065 |
Industry Reference: | CVE-2009-2514 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows 2000 SP4 Windows XP SP2 Windows XP SP3 Windows XP Professional x64 Edition SP2 Windows Server 2003 SP2 Windows Server 2003 x64 Edition SP2 Windows Server 2003 with SP2 (Itanium) |
Vulnerability Description | A remote code execution vulnerability has been reported in the way the Windows kernel-mode drivers are parsing Windows Embedded OpenType (EOT) font code. The Windows kernel is the core of the operating system. It provides system level services such as device management and memory management, allocates processor time to processes, and manages error handling. EOT fonts are a compact form of fonts designed for use on web pages. A remote attacker can exploit this vulnerability via a specially crafted EOT file. Successful exploitation may allow execution of arbitrary code on a vulnerable system. |
Update/Patch Avaliable | Apply patches: Microsoft Security Bulletin MS09-065 |
Vulnerability Details | The vulnerability is due to an error in the Windows kernel-mode drivers that fail to properly parse font code when building a table of directory entries. A remote attacker may exploit this issue via a malformed EOT file. Successful exploitation of this issue allows execution of arbitrary code once the malformed file is being opened or previewed on an affected system. |