Need help? Ask the community or hire an expert.
Go to Avira Answers
Data em que surgiu:03/11/2011
Includo na lista "In The Wild"Sim
Nvel de danos:Baixo
Nvel de distribuio:Baixo
Nvel de risco:Baixo
Ficheiro esttico:No
Verso do motor antivrus:

 Vulgarmente Sistemas Operativos:
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Efeitos secundrios:
    Pode ser usado para executar cdigo malicioso
   • Aproveita-se de vulnerabilidades do software

 Deteco especial  CVE-2011-3402

The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploitation gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.

Histrico da verso:   ( 07/11/2011 )

설명 삽입자 Andrei Gherman   2011년 11월 7일 월요일
설명 업데이트 Andrei Gherman   2011년 11월 7일 월요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.