First published: Thu Jun 16 2011(Updated: )
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 on 64-bit platforms does not properly validate pointers during the parsing of OpenType (aka OTF) fonts, which allows remote attackers to execute arbitrary code via a crafted font file, aka "Win32k OTF Validation Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1873 is rated as critical, as it allows for potential remote code execution through malformed OpenType fonts.
To fix CVE-2011-1873, you should apply the latest security updates provided by Microsoft for the affected Windows versions.
CVE-2011-1873 affects Windows XP SP2, Windows Vista SP1 and SP2, Windows 7, and various editions of Windows Server 2003 and 2008.
CVE-2011-1873 enables attackers to execute arbitrary code on the affected systems through specially crafted OpenType fonts.
Yes, if you're using an unsupported version of Windows that is affected by CVE-2011-1873, your system remains at risk for exploitation.