Need help? Ask the community or hire an expert.
Go to Avira Answers
La date de la dcouverte:05/12/2012
En circulation:Non
Infections signales Moyen
Potentiel de distribution:Faible
Potentiel de destruction:Faible
Fichier statique:Non
Taille du fichier:~ 4.201 Octets
Version VDF: - mercredi 5 décembre 2012
Version IVDF: - mercredi 5 décembre 2012

 Gnral Les alias:
   •  Symantec: Trojan.Gen.2
   •  Kaspersky: Exploit.Win32.CVE-2011-3402.b
   •  Sophos: Troj/DexFont-A

Plateformes / Systmes d'exploitation:
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Effets secondaires:
    Peut tre utilis pour excuter un code malveillant
   • Il emploie les vulnrabilits de software

 Dtection spciale CVE-2011-3402

The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploit gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.

Beschrijving ingevoegd door Martin Muench op zondag 30 december 2012
Beschrijving bijgewerkt door Martin Muench op zondag 30 december 2012

Terug . . . .
https:// Dit venster is voor uw veiligheid gecodeerd.