Short Name |
HTTP:STC:IE:EOTF-LZCOMP-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Windows Embedded OpenType Font Engine LZCOMP Integer Overflow |
Release Date |
2010/09/22 |
Update Number |
1777 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Windows. An integer overflow flaw exists in Microsoft Windows Embedded OpenType (EOT) Font Engine. It is due to insufficient validation of an integer value by the font decompression code in the EOT Font Engine. An attacker can create a malicious Web page utilizing Cascading Style Sheets (CSS) that specify a malicious Embedded OpenType (EOT) font file and entices a victim to view the page. A successful attack can allow remote code execution with the privileges of the user.
Microsoft Windows is prone to a remote code-execution vulnerability that affects the Embedded OpenType font engine. An attacker can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Successful exploits may aid in the compromise of affected computers. Failed attempts may trigger a denial-of-service condition.