MS.Windows.OpenType.Font.Buffer.Overflow

description-logoDescription

Compact Font Format (also known as CFF font format, Type 2 font format, or CFF/Type 2 font format) is a lossless compaction of the Type 1 format using Type 2 charstrings. It is designed to use less storage space than Type 1 fonts, by using operators with multiple arguments, various pre-defined default values, more efficient allotment of encoding values and shared subroutines within a FontSet (family of fonts).
In April 2011, Microsoft released a security update resolves a privately reported vulnerability in the OpenType Compact Font Format (CFF) driver.
In April 2011, Adam Twardoch of Fontlab Ltd. reported a stack overflow remote code execution vulnerability in Microsoft Windows OpenType Font (OTF) Driver, which is due to the failure to handle the exceptional conditions. In detail, when processing the OpenType font, the OpenType Compact Font Format (aka OTF or CFF) driver does not handle the parameter values properly and cause stack based buffer overflow, then result in arbitrary code execution within the context of current logged in user.(CVE-2011-0034)

affected-products-logoAffected Products

Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1

Impact logoImpact

The vulnerability could allow remote code execution if a user views content rendered in a specially crafted CFF font. In all cases, an attacker would have no way to force users to view the specially crafted content. Therefore, an attacker would entice users to open a Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.

recomended-action-logoRecommended Actions

For FortiGate users, turning on following IPS signature can prevent exploration of this vulnerability:
MS.Windows.OpenType.Font.Stack.Overflow
Apply the patch from vendor:
http://technet.microsoft.com/en-us/security/bulletin/ms11-032
Workarounds:
1) Disable the Preview Pane and Details Pane in Windows Explorer
To disable these panes in Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2, perform the following steps:
-Open Windows Explorer, click Organize, and then click Layout.
-Clear both the Details pane and Preview pane menu options.
-Click Organize, and then click Folder and search options.
-Click the View tab.
-Under Advanced settings, check the Always show icons, never thumbnails box.
-Close all open instances of Windows Explorer for the change to take effect.
2) Disable the WebClient service
To disable the WebClient Service, perform the following steps:
-Click Start, click Run, type Services.msc and then click OK.
-Right-click WebClient service and select Properties.
-Change the Startup type to Disabled. If the service is running, click Stop.
-Click OK and exit the management application.

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2024-07-22 28.830
Modified
Name:MS.
Windows.
OpenType.
Font.
Stack.
Overflow:MS.
Windows.
OpenType.
Font.
Buffer.
Overflow