Vulnerability Note VU#675073
Microsoft Windows TrueType font array indexing vulnerability
A vulnerability in the Microsoft Windows TrueType font parsing component could allow an attacker to cause a denial-of-service condition in Microsoft Windows.
The Microsoft Windows kernel includes a driver (win32k.sys) that handles a variety of graphics processing tasks, including the processing of TrueType fonts. A vulnerability exists in the way this driver validates array indexes. This can cause Windows to crash with a "blue screen."
By convincing a user to open a specially-crafted TrueType font file, a remote, unauthenticated attacker could cause a denial-of-service condition.
Apply an update
This issue is addressed in Microsoft Security Bulletin MS11-084.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||13 Jun 2011||08 Nov 2011|
CVSS Metrics (Learn More)
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
- CVE IDs: CVE-2011-2004
- Date Public: 08 Nov 2011
- Date First Published: 08 Nov 2011
- Date Last Updated: 28 Mar 2012
- Severity Metric: 2.92
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.