Active Exploitation of Unpatched Windows Font Parsing Vulnerability

Active Exploitation of Unpatched Windows Font Parsing Vulnerability

Yesterday (March 23), Microsoft [published details about two unpatched vulnerabilities](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200006) in a font rendering technology in many versions of Microsoft Windows with a warning that Microsoft was aware of “limited, targeted attacks” leveraging the unpatched flaws. The vulnerability has different levels of impact depending on the target, installed software, and deployed mitigations. While the vulnerable code is present in Windows 7 through Windows Server 2019, active exploitation appears to be targeting specific Windows 7 users.


Vulnerability details: The two vulnerabilities exist when the library improperly handles a specially-crafted font in the Adobe Type 1 Postscript format. There are multiple attack vectors for leveraging the vulnerability by allowing these types of fonts to be processed—for instance, social engineering attacks that convince a user to open a file, or viewing a file through the Windows preview pane.


Affected versions include:


All versions of Windows from 7 through Windows Server 2019

MSRC has [released a set of recommended mitigations](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200006) for this vulnerability.


Rapid7 analysis: This vulnerability requires a degree of precision from an attacker in order to successfully execute an attack. While it's couched as a remote code execution vulnerability, it does require that the user download and open or view a corrupted font file before exploitation is possible. Microsoft indicated in their advisory that targets of active exploitation were limited to Windows 7. This likely means that successful exploitation on newer operating systems is much more difficult. Mitigations present in Windows 10 and related operating systems prevent an affected application from escaping the Windows sandbox, limiting the blast radius of thi ..

Support the originator by clicking the read the rest link below.