Vulnerabilities > CVE-2010-3957 - Resource Management Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Double free vulnerability in the OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Double Free Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 18 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS10-091 |
bulletin_url | |
date | 2010-12-14T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2296199 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS10-091.NASL |
description | The remote Windows host contains a version of the OpenType Font (OTF) Format Driver that is affected by two vulnerabilities : - The driver does not properly index an array when parsing OpenType fonts, which could allow a remote attacker to run arbitrary code in kernel mode. (CVE-2010-3956) - The driver does not properly reset a pointer when freeing memory, resulting in a |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 51163 |
published | 2010-12-15 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/51163 |
title | MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution (2296199) |
code |
|
Oval
accepted | 2012-03-26T04:01:22.947-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Double free vulnerability in the OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Double Free Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:12329 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2010-06-08T13:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | OpenType Font Double Free Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 75 |
References
- http://www.securitytracker.com/id?1024873
- http://www.securitytracker.com/id?1024873
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-091
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-091
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12329
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12329