MS10-001: Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (972270)

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.

Synopsis :

It is possible to execute arbitrary code on the remote Windows host
using the Embedded OpenType Font Engine.

Description :

The remote Windows host contains a version of the Embedded OpenType
(EOT) Font Engine that is affected by an integer overflow
vulnerability in the 'LZCOMP' decompressor when decompressing a
specially crafted font.

If an attacker can trick a user on the affected system into viewing
content rendered in a specially crafted EOT font, this issue could be
leveraged to execute arbitrary code subject to the user's privileges.

See also :

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista, 2008, and Windows 7.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 43865 ()

Bugtraq ID: 37671

CVE ID: CVE-2010-0018

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now