Zero-day vulnerability in Windows

Memory corruption

This vulnerability was being actively exploited by the Stuxnet in Duqu attack.

Known malware:


Vulnerability details

Advisory: SB2011110101 - Remote code execution in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2011-3402

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-119 - Memory corruption


The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers. A remote attacker can create a specially crafted Word document or web page containing font data, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.