ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [VulnWatch] [EEYEB-2000801] - Windows Embedded Open Type (EOT) Font Heap Overflow Vulnerability



ôÅÈÎÉÞÅÓËÉÅ ÐÏÄÒÏÂÎÏÓÔÉ 


> 
> EEYEB-20050801 Windows Embedded Open Type (EOT) Font Heap Overflow
> Vulnerability
> 
> Release Date:
> January 10, 2006
> 
> Date Reported:
> July 31, 2005
> 
> Time to Patch:
> 163 Days
> 
> Severity:
> High (Code Execution)
> 
> Systems Affected:
> Windows ME
> Windows 98
> Windows NT
> Windows 2000
> Windows XP SP1 / SP2
> Windows Server 2003 SP0 / SP1
> 
> Overview:
> eEye Digital Security has discovered a vulnerability in the 
> way Windows
> uncompresses Embedded Open Type fonts that would allow the author of a
> malicious web page to execute arbitrary code on the system of 
> a user who
> visits the site, at the privilege level of that user.
> 
> Embedded Open Type fonts are referenced through the use of style data,
> as the following snippet illustrates:
> 
>     @font-face {
>         font-family: Abysmal;
>         font-style:  normal;
>         font-weight: normal;
>         src: url(evil.eot);
> 
> Although these fonts typically have .eot file extensions, it should be
> noted that any extension may be used in order to exploit this
> vulnerability.
> 
> Technical Details:
> A heap overflow vulnerability exists in T2EMBED.DLL, which Internet
> Explorer invokes to process EOT fonts.  The data within an EOT file is
> compressed in Agfa MicroType Express format, which hosts an
> LZ-compressed stream that includes a 24-bit allocation size.  
> This size
> + 1C00h is allocated within the function MTX_LZCOMP_UnPackMemory, but
> the resulting allocation size is not validated before data is copied
> into the block, allowing a malformed EOT file to cause an essentially
> arbitrary-length heap buffer overflow with binary data.
> 
> Protection:
> Retina Network Security Scanner has been updated to identify this
> vulnerability.
> Blink End-Point Protection proactively protects against this
> vulnerability.
> 
> Vendor Status:
> Microsoft has released a patch for this vulnerability.  The patch is
> available at:
> http://www.microsoft.com/technet/security/bulletin/MS06-002.mspx
> 
> References:
> EEYE ID# EEYEB-20050801
> OSVDB ID# 18829
> CVE # CVE-2006-0010
> 
> Credit:
> Fang Xing
> 
> Greetings:
> eEye Research and especially Derek for all his help
> 
> Copyright (c) 1998-2006 eEye Digital Security Permission is hereby
> granted for the redistribution of this alert electronically.  
> It is not
> to be edited in any way without express consent of eEye.  If 
> you wish to
> reprint the whole or any part of this alert in any other medium
> excluding electronic medium, please email alert@xxxxxxxx for 
> permission.
> 
> Disclaimer:
> The information within this paper may change without notice.  Use of
> this information constitutes acceptance for use in an AS IS condition.
> There are no warranties, implied or express, with regard to this
> information.  In no event shall the author be liable for any direct or
> indirect damages whatsoever arising out of or in connection 
> with the use
> or spread of this information.  Any use of this information is at the
> user's own risk.
> 




 




Copyright © Lexa Software, 1996-2009.