Besoin d’aide ? Fais appel à la communauté ou embauche un spécialiste.
Aller à Avira Answers
Descoperit pe data de:03/11/2011
Numar infectii raportate:Scazut
Potential de raspandire:Scazut
Potential de distrugere:Scazut
Fisier static:Nu
Versiune motor de scanare:

 General Sistem de operare:
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Efecte secundare:
   • Poate fi utilizat pentru a executa cod malitios
   • Profita de vulnerabilitatile softului
      •  CVE-2011-3402

 Detectie speciala CVE-2011-3402

The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploitation gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.

Istoric versiuni:
   •   ( 07/11/2011 )

Description insérée par Andrei Gherman le lundi 7 novembre 2011
Description mise à jour par Andrei Gherman le lundi 7 novembre 2011

Retour . . . .