CVE-2010-1883 in Windowsinfo

Summary

Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted table in an embedded font, aka "Embedded OpenType Font Integer Overflow Vulnerability."

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Reservation

05/11/2010

Disclosure

10/13/2010

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!