search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft font processing buffer overflow vulnerability

Vulnerability Note VU#943749

Original Release Date: 2005-04-13 | Last Revised: 2005-05-12


A privilege elevation vulnerability exists in the way that Microsoft Windows processes certain fonts. This vulnerability could allow a logged on user to take complete control of the system.


Due to an unchecked buffer in the processing of malicious fonts, a locally authenticated user could take complete control of an affected system. Microsoft indicates that this vulnerability could not be exploited remotely.


A locally authenticated user could potentially execute arbitrary code with elevated privileges and gain complete control of the system.

Microsoft indicates that attempts to exploit this vulnerability on systems running Windows XP Service pack 2 would most likely result in a denial-of-service condition.


Apply a patch

Microsoft has published Microsoft Security Bulletin MS05-018 in response to this issue. Users are strongly encouraged to review this advisory and apply the patches it refers to.

Vendor Information


Microsoft Corporation Affected

Updated:  April 13, 2005



Vendor Statement

For more information please see Microsoft bulletin MS05-018 available at:

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Microsoft who in turn thank John Heasman with Next Generation Security Software Ltd. for reporting the Font Vulnerability.

This document was written by Robert Mead based on information provided by Microsoft.

Other Information

CVE IDs: CVE-2005-0060
Severity Metric: 2.43
Date Public: 2005-04-12
Date First Published: 2005-04-13
Date Last Updated: 2005-05-12 18:49 UTC
Document Revision: 19

Sponsored by CISA.