HTTP: Microsoft Windows Embedded OpenType Font Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Microsoft Windows Embedded OpenType Font. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Extended Description

Microsoft Windows is prone to a remotely exploitable heap-overflow vulnerability because the software fails to properly bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. Remote attackers can exploit this issue to execute arbitrary machine code in the context of the vulnerable software on the targeted user's computer.

Affected Products

Nortel_networks self-service_media_processing_server,Microsoft windows_server_2008_for_itanium-based_systems

References

BugTraq: 35186 35187

CVE: CVE-2009-0231

Short Name
HTTP:STC:DL:OTF-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2009-0231 CVE-2009-0232 Embedded Font Microsoft OpenType Overflow Windows bid:35186 bid:35187
Release Date
07/21/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3721
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

CVSS Score

9.3

Found a potential security threat?