Need help? Ask the community or hire an expert.
Go to Avira Answers
En circulacin (ITW):S
Nmero de infecciones comunicadas:Bajo
Potencial de propagacin:Bajo
Potencial daino:Bajo
Fichero esttico:No
Versin del motor antivirus:

 General Plataformas / Sistemas operativos:
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Efectos secundarios:
    Se puede utilizar para ejecutar un cdigo malintencionado
   • Emplea vulnerabilidades de software

 Deteccin especial CVE-2011-3402

The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploitation gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.

Historial de la versin:   ( 07/11/2011 )

설명 삽입자 Andrei Gherman   2011년 11월 7일 월요일
설명 업데이트 Andrei Gherman   2011년 11월 7일 월요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.