First published: Mon May 02 2005(Updated: )
Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =web | |
Microsoft Windows 2003 Server | =enterprise | |
Microsoft Windows 2003 Server | =enterprise_64-bit | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | ||
Microsoft Windows XP | ||
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows 98SE | ||
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows Me | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =standard | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows 98 | =gold | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2000 | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0060 is classified as critical due to the buffer overflow vulnerability allowing local users to gain elevated privileges.
To fix CVE-2005-0060, apply the latest security updates released by Microsoft for the affected operating systems.
CVE-2005-0060 affects Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003.
CVE-2005-0060 can be exploited by local users who run a specially-designed application targeting the buffer overflow in the font processing component.
CVE-2005-0060 specifically targets the font processing component in the affected Microsoft Windows operating systems.