Need help? Ask the community or hire an expert.
Go to Avira Answers
Nom:EXP/CVE-2011-3402
La date de la découverte:03/11/2011
Type:Exploit
En circulation:Oui
Infections signalées Faible
Potentiel de distribution:Faible
Potentiel de destruction:Faible
Fichier statique:Non
Version du moteur de scan:8.02.06.108

 Général Plateformes / Systèmes d'exploitation:
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Effets secondaires:
   • Peut être utilisé pour exécuter un code malveillant
   • Il emploie les vulnérabilités de software
      •  CVE-2011-3402

 Détection spéciale CVE-2011-3402

The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploitation gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.


Historique de la version:
   •  8.02.06.108   ( 07/11/2011 )

Açıklamayı yerleştiren Andrei Gherman tarihinde 7 Kasım 2011 Pazartesi
Açıklamayı güncelleyen: Andrei Gherman tarihinde 7 Kasım 2011 Pazartesi

Geri . . . .
https:// Bu pencere güvenlik amacıyla şifrelenmiştir.