MS15-044: Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple vulnerabilities.

Description :

The remote Windows host is affected by multiple vulnerabilities :

- An information disclosure vulnerability exists due to
improper handling of OpenType fonts by the Windows
DirectWrite library. A remote attacker can exploit this
vulnerability by convincing a user to open a file or
visit a website containing a specially crafted OpenType
font, resulting in the disclosure of sensitive
information. (CVE-2015-1670)

- A remote code execution vulnerability exists due to
improper handling of TrueType font files by the Windows
DirectWrite library. A remote attacker can exploit this
vulnerability by convincing a user to open a specially
crafted document or visit a website containing a
specially crafted TrueType font file, resulting in
execution of arbitrary code in the context of the
current user. (CVE-2015-1671)

See also :

https://technet.microsoft.com/library/security/MS15-044

Solution :

Microsoft has released a set of patches for Windows 2003, Vista, 2008,
7, 2008 R2, 8, 2012, 8.1, and 2012 R2. Additionally, Microsoft has
released a set of patches for Office 2007, Office 2010, Live Meeting
2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013, Lync Basic
2013; and .NET Framework 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 83440 ()

Bugtraq ID: 74485
74490

CVE ID: CVE-2015-1670
CVE-2015-1671

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now