Microsoft Windows contains two vulnerabilities in the parsing of Adobe Type 1 fonts, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Adobe Type Manager, which is provided by atmfd.dll, is a kernel module that is provided by Windows and provides support for OpenType fonts. Two vulnerabilities in the Microsoft Windows Adobe Type Manager library may allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system. This vulnerability affects all supported versions of Windows, as well as Windows 7. This vulnerability is being exploited in the wild.
By causing a Windows system to open a specially crafted document or view it in the Windows preview pane, an unauthenticated remote attacker may be able to execute arbitrary code with kernel privileges on a vulnerable system. Windows 10 based operating systems would execute the code with limited privileges, in an AppContainer sandbox.
The CERT/CC is currently unaware of a practical solution to this problem. Please consider the following workarounds that are listed in Microsoft Security Advisory ADV200006:
This mitigation appears to be to the most effective workaround for this vulnerability, as it blocks the vulnerable code from being used by Windows. Please see Microsoft Security Advisory ADV200006 for more details. Because supported Windows 10 versions do not use ATMFD.DLL, this mitigation is not applicable.
This document was written by Will Dormann.
|Date First Published:||2020-03-23|
|Date Last Updated:||2020-03-24 17:36 UTC|