Besoin d’aide ? Fais appel à la communauté ou embauche un spécialiste.
Aller à Avira Answers
VrusEXP/CVE-2011-3402.B
Data em que surgiu:05/12/2012
Tipo:Exploit
Includo na lista "In The Wild"No
Nvel de danos:Mdio
Nvel de distribuio:Baixo
Nvel de risco:Baixo
Ficheiro esttico:No
Tamanho:~ 4.201 Bytes
Verso VDF:7.11.52.188 - quarta-feira, 5 de dezembro de 2012
Verso IVDF:7.11.52.188 - quarta-feira, 5 de dezembro de 2012

 Vulgarmente Alias:
   •  Symantec: Trojan.Gen.2
   •  Kaspersky: Exploit.Win32.CVE-2011-3402.b
   •  Sophos: Troj/DexFont-A


Sistemas Operativos:
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7


Efeitos secundrios:
    Pode ser usado para executar cdigo malicioso
   • Aproveita-se de vulnerabilidades do software
CVE-2011-3402

 Deteco especial  CVE-2011-3402

Descrio:
The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploit gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.

Description insérée par Martin Muench le dimanche 30 décembre 2012
Description mise à jour par Martin Muench le dimanche 30 décembre 2012

Retour . . . .
https:// Cet écran est crypté pour votre sécurité.