Vulnerabilities > CVE-2010-1883 - Numeric Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted table in an embedded font, aka "Embedded OpenType Font Integer Overflow Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 17 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS10-076 |
bulletin_url | |
date | 2010-10-12T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 982132 |
knowledgebase_url | |
severity | Critical |
title | Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS10-076.NASL |
description | The remote Windows host contains a version of the Embedded OpenType (EOT) Font Engine that is affected by an integer overflow vulnerability when parsing certain tables within specially crafted files and content containing embedded fonts. If an attacker can trick a user on the affected system into viewing content rendered in a specially crafted EOT font, this issue could be leveraged to execute arbitrary code subject to the user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 49953 |
published | 2010-10-13 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/49953 |
title | MS10-076: Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132) |
code |
|
Oval
accepted | 2012-03-26T04:03:32.762-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted table in an embedded font, aka "Embedded OpenType Font Integer Overflow Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:6881 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2010-10-12T13:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Embedded OpenType Font Integer Overflow Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 74 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 43775 CVE ID: CVE-2010-1883 Microsoft Windows是微软发布的非常流行的操作系统。 Windows的t2embed.dll库中在将嵌入式OpenType文件转换为TrueType格式时存在整数溢出漏洞。在解析hdmx记录时,盲目的信任了记录大小和记录计数变量,并将所生成的值在拷贝循环中使用,这可能导致执行任意代码。 Microsoft Windows XP SP3 Microsoft Windows XP Pro x64版SP2 Microsoft Windows Vista SP2 Microsoft Windows Vista SP1 Microsoft Windows Server 2008 SP2 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2008 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 SP1 Microsoft Windows 7 临时解决方法: * 在Internet Explorer中禁止解析嵌入式字体。 * 拒绝对T2EMBED.DLL的访问。 Windows XP和Windows Server 2003: 对于32位系统,在管理命令提示符后面以下命令: Echo y| cacls "%windir%\system32\t2embed.dll" /E /P everyone:N 对于64位系统,在管理命令提示符后面以下命令: Echo y| cacls "%windir%\syswow64\t2embed.dll" /E /P everyone:N Windows Vista和Windows Server 2008: 对于32位系统,在管理命令提示符后面以下命令: Takeown.exe /f "%windir%\system32\t2embed.dll" cacls.exe "%windir%\system32\t2embed.dll" /E /P everyone:N 对于64位系统,在管理命令提示符后面以下命令: Takeown.exe /f "%windir%\syswow64\t2embed.dll" cacls.exe "%windir%\syswow64\t2embed.dll" /E /P everyone:N 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS10-076)以及相应补丁: MS10-076:Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132) 链接:http://www.microsoft.com/technet/security/bulletin/MS10-076.mspx?pf=true |
id | SSV:20174 |
last seen | 2017-11-19 |
modified | 2010-10-15 |
published | 2010-10-15 |
reporter | Root |
title | Microsoft Windows嵌入式OpenType字体引擎整数溢出漏洞(MS10-076) |
References
- http://www.us-cert.gov/cas/techalerts/TA10-285A.html
- http://www.us-cert.gov/cas/techalerts/TA10-285A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-076
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-076
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6881
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6881