Short Name |
HTTP:STC:DL:TRUETYPE-PARSE2 |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Windows TrueType Font Parsing Remote Code Execution (CVE-2012-0159) |
Release Date |
2012/05/07 |
Update Number |
2131 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Microsoft Windows TrueType Font. A successful attack can lead to arbitrary code execution.
Microsoft Windows is prone to a remote code-execution vulnerability that affects the TrueType Font engine. An attacker can exploit this issue through the Windows Kernel-Mode drivers to execute arbitrary code in kernel mode. The attacker can also exploit this issue through Microsoft Silverlight, Microsoft Office, or other affected Windows components to execute arbitrary code with user-level privileges. Successful exploits will completely compromise an affected computer. Failed attempts will result in a denial-of-service condition.