Short Name |
HTTP:STC:IE:EOT-WEBFONTS-DL |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Internet Explorer WebFonts File Download |
Release Date |
2006/01/10 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects the transfer of an embedded font over HTTP (eot file). This file format is known to contain some recognized vulnerabilities, which can result in a denial-of-service condition on the client system or arbitrary remote code execution. Internet Explorer is known to be vulnerable to this kind of attack.
Microsoft Windows is susceptible to a remotely exploitable buffer-overflow vulnerability. This issue is due to the software's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue allows remote attackers to execute arbitrary machine code in the context of the vulnerable software on the targeted user's computer.