This window is encrypted for your security.
Need help? Ask the community or hire an expert.
Go to Avira Answers
Descoperit pe data de:
Numar infectii raportate:
Potential de raspandire:
Potential de distrugere:
Versiune motor de scanare:
Sistem de operare:
• Windows XP
• Windows 2003
• Windows Vista
• Windows Server 2008
• Windows 7
• Poate fi utilizat pentru a executa cod malitios
• Profita de vulnerabilitatile softului
The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.
An exploitation gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.
In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.
Other possibilities may include using embedded TTF fonts in other types of files such as PDF.
• 8.02.06.108 ( 07/11/2011 )
Description inserted by Andrei Gherman on Monday, November 7, 2011
Description updated by Andrei Gherman on Monday, November 7, 2011
Get in touch
Questions? We are happy to help you.
1 800 403 7019
Start a chat
Send an email
Find a solution in our Avira Answers community
Send an email
Case Record Type