HTTP: Microsoft Windows TrueType Font Parsing Remote Code Execution (CVE-2012-0159)

This signature detects attempts to exploit a known vulnerability against Microsoft Windows TrueType Font. A successful attack can lead to arbitrary code execution.

Extended Description

Microsoft Windows is prone to a remote code-execution vulnerability that affects the TrueType Font engine. An attacker can exploit this issue through the Windows Kernel-Mode drivers to execute arbitrary code in kernel mode. The attacker can also exploit this issue through Microsoft Silverlight, Microsoft Office, or other affected Windows components to execute arbitrary code with user-level privileges. Successful exploits will completely compromise an affected computer. Failed attempts will result in a denial-of-service condition.

Affected Products

Avaya messaging_application_server,Microsoft windows_server_2008_for_itanium-based_systems

References

BugTraq: 53335

CVE: CVE-2012-0159

Short Name
HTTP:STC:DL:TRUETYPE-PARSE2
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
(CVE-2012-0159) CVE-2012-0159 Code Execution Font Microsoft Parsing Remote TrueType Windows bid:53335
Release Date
05/07/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?