[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Remote Code Execution Vulnerability in the Embedded OpenType Font Engine - MS10-001

ID: oval:org.secpod.oval:def:1224Date: (C)2011-06-20   (M)2023-12-14
Class: PATCHFamily: windows




The host is missing a Critical security update according to Microsoft security bulletin, MS10-001. The update is required to fix remote code execution vulnerability. A flaw is present in the OpenType (EOT) Font Client which fails to properly parse specially crafted EOT fonts. Successful exploitation allows an attacker to run arbitrary code in kernel mode and hence install programs, view, change, or delete data or create new accounts with full user rights.

Platform:
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Reference:
MS10-001
CVE-2010-0018
CVE    1
CVE-2010-0018
CPE    33
cpe:/o:microsoft:windows_server_2008:::x86
cpe:/o:microsoft:windows_xp::sp3:x86
cpe:/o:microsoft:windows_7:::x64
cpe:/o:microsoft:windows_server_2008::r2:x64
...
XCCDF    9
xccdf_com.secpod_benchmark_microsoft-windows-2000
xccdf_com.secpod_benchmark_microsoft-windows-server-2008
xccdf_com.secpod_benchmark_microsoft-windows-server-2003
xccdf_com.secpod_benchmark_microsoft-windows-7
...

© SecPod Technologies