CERT mailing list archives

Current Activity - Microsoft Releases Security Advisory for Vulnerability in TrueType Font Parsing


From: Current Activity <us-cert () us-cert gov>
Date: Fri, 4 Nov 2011 09:30:08 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Microsoft Releases Security Advisory for Vulnerability in TrueType Font Parsing

Original release date: November 4, 2011 at 8:27 am
Last revised: November 4, 2011 at 8:27 am


Microsoft has released Microsoft Security Advisory 2639658 to address
a vulnerability in the Win32k TrueType font parsing engine. By
convincing a user to open a malicious email attachment, an attacker
may be able to exploit this vulnerability and execute arbitrary code.

Microsoft has indicated that it is aware of targeted attacks
exploiting this vulnerability. The Duqu malware may exploit this
vulnerability.

US-CERT encourages users and administrators to take the following
actions to help mitigate the risks of this vulnerability and the Duqu
malware:
  * Review Microsoft Security Advisory 2639658 and apply the suggested
    workarounds until a patch is released by the vendor.
  * Use caution when opening attachments in email messages.
  * Maintain up-to-date antivirus software.

US-CERT will provide additional information as it becomes available.

Relevant Url(s):
<http://technet.microsoft.com/en-us/security/advisory/2639658>

====
This entry is available at
http://www.us-cert.gov/current/index.html#microsoft_releases_security_advisory_for4

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTrPo1T/GkGVXE7GMAQJXwAf/fm5Ltdq1mIwdcCscMGrraa2ytnYo4Xwm
p5T2U7gAFDKfrrl1EBcIm3uCBwLPDw6HopUw3wyDjfC8pKg8js4YZaQ40L/+Ig28
bIeKM8CzSqQoAHrRyDxjmL7qlx7maFuYMt496pcW7N1AsPwaPdaRFxMuuhIWopAe
rRWJI/l1mrV5bYOa5wqnow9mQD6ZLQ4QhBItJ+O91s+99IWqOw/Uz40V+yQXOYKB
hb4a9+PLmUIGfSvaE2JezDpqF2vHdeIvzrtUnNjG0Oqf8wTuGP3zQ4uw91m7RxQh
kG61xoWjlFsM5ly3x5DXHG0yMD7r8eBoN8ZI3UC4PyZIEjFpwAK0Sg==
=uxL1
-----END PGP SIGNATURE-----


Current thread: