Microsoft Windows 7/Server 2003/Server 2008/Vista/XP OpenType Font atmfd.dll denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.7 | $0-$5k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in Microsoft Windows 7/Server 2003/Server 2008/Vista/XP. This impacts an unknown function in the library atmfd.dll of the component OpenType Font. Performing a manipulation results in denial of service. The attack may be initiated remotely. In addition, an exploit is available. You should upgrade the affected component.
Details
A vulnerability classified as critical has been found in Microsoft Windows 7/Server 2003/Server 2008/Vista/XP (Operating System). This affects some unknown functionality in the library atmfd.dll of the component OpenType Font. The manipulation with an unknown input leads to a denial of service vulnerability. CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. This is going to have an impact on availability.
The weakness was presented 06/12/2012 by Oleksiuk Dmytro (Website). The advisory is shared at blog.cr4.sh. The public release happened without involvement of Microsoft. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details and a public exploit are known. MITRE ATT&CK project uses the attack technique T1499 for this issue.
A public exploit has been developed by Cr4sh and been published immediately after the advisory. The exploit is shared for download at dl.dropbox.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $5k-$25k.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at Exploit-DB (19089), OSVDB (82928†) and Secunia (SA49514†). Further details are available at packetstormsecurity.org. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 6.7
VulDB Base Score: 7.5
VulDB Temp Score: 6.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Cr4sh
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
06/12/2012 🔍06/12/2012 🔍
06/12/2012 🔍
06/13/2012 🔍
06/19/2012 🔍
08/19/2018 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: blog.cr4.sh
Researcher: Oleksiuk Dmytro
Status: Not defined
GCVE (VulDB): GCVE-100-5553
Secunia: 49514 - Microsoft Windows OpenType Font Processing Denial of Service Vulnerability, Not Critical
OSVDB: 82928 - Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
scip Labs: https://www.scip.ch/en/?labs.20140213
Misc.: 🔍
Entry
Created: 06/19/2012 16:07Updated: 08/19/2018 19:51
Changes: 06/19/2012 16:07 (49), 08/19/2018 19:51 (6)
Complete: 🔍
Cache ID: 216:EBA:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.