Need help? Ask the community or hire an expert.
Go to Avira Answers
Nombre:EXP/CVE-2011-3402.B
Descubierto:05/12/2012
Tipo:Exploit
En circulación (ITW):No
Número de infecciones comunicadas:Medio
Potencial de propagación:Bajo
Potencial dañino:Bajo
Fichero estático:No
Tamaño:~ 4.201 Bytes
Versión del VDF:7.11.52.188 - miércoles, 5 de diciembre de 2012
Versión del IVDF:7.11.52.188 - miércoles, 5 de diciembre de 2012

 General Alias:
   •  Symantec: Trojan.Gen.2
   •  Kaspersky: Exploit.Win32.CVE-2011-3402.b
   •  Sophos: Troj/DexFont-A


Plataformas / Sistemas operativos:
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Efectos secundarios:
   • Se puede utilizar para ejecutar un código malintencionado
   • Emplea vulnerabilidades de software
      •  CVE-2011-3402

 Detección especial CVE-2011-3402

Descripción:
The exploit EXP/CVE-2011-3402 is targeting the True-Type-Font parsing engine which is run in kernel-mode. This fact makes this exploit very dangerous as an attacker can gain system level privileges.

An exploit gives the attacker the ability to install programs/drivers, view, change, or delete data or he could create new accounts with full user rights.

In an e-mail scenario the exploit needs user interaction (for instance by opening a malicious word document) to get executed. The discovered exploit comes in the form of a Microsoft word document.

Other possibilities may include using embedded TTF fonts in other types of files such as PDF.

Açıklamayı yerleştiren Martin Muench tarihinde 30 Aralık 2012 Pazar
Açıklamayı güncelleyen: Martin Muench tarihinde 30 Aralık 2012 Pazar

Geri . . . .
https:// Bu pencere güvenlik amacıyla şifrelenmiştir.