Zero-day vulnerability in Windows

Memory corruption
CVE-2011-3402

This vulnerability was being actively exploited by the Stuxnet in Duqu attack.

Known malware:

Win32/Exploit.CVE-2011-3402.G
W32.Duqu

Vulnerability details

Advisory: SB2011110101 - Remote code execution in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2011-3402

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Description:

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers. A remote attacker can create a specially crafted Word document or web page containing font data, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.