漏洞标题
微软图形远程代码执行漏洞
漏洞描述信息
当Windows字体库不正确处理特别设计的嵌入字体时,存在远程代码执行漏洞,也称为“微软图形远程代码执行漏洞”。此CVE ID与CVE-2019-1144、CVE-2019-1149、CVE-2019-1150、CVE-2019-1151和CVE-2019-1152不同。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
Microsoft Graphics Remote Code Execution Vulnerability
漏洞描述信息
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
There are multiple ways an attacker could exploit the vulnerability:
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email.
In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file.
The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
Microsoft Windows和Windows Server 输入验证错误漏洞
漏洞描述信息
Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。 Microsoft Windows和Microsoft Windows Server中的fontsub.dll存在输入验证错误漏洞,该漏洞源于字体库没有正确处理特制的嵌入字体。攻击者可利用该漏洞控制受影响的系统。以下产品及版本受到影响:Micr
CVSS信息
N/A
漏洞类别
缓冲区错误