Windows kernel-mode drivers vulnerability could allow remote code execution
Report ID: MS201112001
Date Published: 14 December 2011
Compromise Type: remote-code-execution
Compromise From: remote
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
A vulnerability in the Windows kernel, caused by improper handling of TrueType font file, could allow arbitrary code execution in kernel-mode.
Microsoft has issued a fix for an earlier reported vulnerability involving the handling of TrueType font files. When a Windows kernel mode driver fails to perform proper validation when writing into a buffer, a resulting vulnerability could allow an attacker to execute code in kernel-mode and take control of the affected system.
This issue has been resolved through the update by modifying the way that TrueType font files are handled. Users are recommended to install the latest update to protect their system from potential exploit.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms11-087)