Need help? Ask the community or hire an expert.
Go to Avira Answers
Nombre:EXP/CVE-2011-3402.B
Descubierto:05/12/2012
Tipo:Exploit
En circulación (ITW):No
Número de infecciones comunicadas:Medio
Potencial de propagación:Bajo
Potencial dañino:Bajo
Fichero estático:No
Tamaño:~ 4.201 Bytes
Versión del VDF:7.11.52.188 - miércoles, 5 de diciembre de 2012
Versión del IVDF:7.11.52.188 - miércoles, 5 de diciembre de 2012

 General Alias:
   •  Symantec: Trojan.Gen.2
   •  Kaspersky: Exploit.Win32.CVE-2011-3402.b
   •  Sophos: Troj/DexFont-A


Plataformas / Sistemas operativos:
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Efectos secundarios:
   • Se puede utilizar para ejecutar un código malintencionado
   • Emplea vulnerabilidades de software
      •  CVE-2011-3402

 Detección especial CVE-2011-3402

Descripción:
The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploit gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.

설명 삽입자 Martin Muench   2012년 12월 30일 일요일
설명 업데이트 Martin Muench   2012년 12월 30일 일요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.