This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.
The remote Windows host has a code execution vulnerability in its
font parsing engine.
The remote host has an unspecified code execution vulnerability in
the Win32k TrueType font parsing engine. Specially crafted TrueType
fonts are not properly handled, which could allow arbitrary code
execution in kernel mode. A remote attacker could exploit this
vulnerability by tricking a user into viewing a specially crafted
TrueType font (e.g., via web or email).
This vulnerability is reportedly exploited by the Duqu malware and is
being exploited in the wild.
Note that this plugin has been deprecated on December 13, 2011 with
the publication by Microsoft of MS11-087.
See also :
Apply the workaround referenced in Microsoft Security Advisory
(2639658). This workaround may cause some fonts to display
improperly. Refer to the advisory for more information.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.0
Public Exploit Available : true