First published: Fri Oct 13 2017(Updated: )
The Microsoft Graphics Component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability in the way it handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-11763.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11762 has been classified as a critical remote code execution vulnerability.
To fix CVE-2017-11762, it's essential to apply the security updates provided by Microsoft for affected Windows versions.
CVE-2017-11762 affects multiple versions of Windows, including Windows 7 SP1, Windows 10, Windows Server 2008, and Windows Server 2016, among others.
Yes, CVE-2017-11762 can be exploited remotely, allowing an attacker to execute arbitrary code on the affected system.
While applying updates is strongly recommended, disabling the Microsoft Graphics Component may serve as a temporary workaround for CVE-2017-11762.