CISA KEV 정보
| 취약점명 | Microsoft Windows Open Type Font Remote Code Execution Vulnerability |
|---|---|
| 설명 | A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploits this vulnerability could take control of the affected system. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-284 |
| 등록일 (KEV) | 2022-05-25 |
| 조치 기한 | 2022-06-15 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2016-7256 |
NVD 상세 정보
CVSS v3.1: 8.8 HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVSS v2.0: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C설명: atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Open Type Font Remote Code Execution Vulnerability."
참조
- http://www.securityfocus.com/bid/94156 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1037243 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-132 [Patch, Vendor Advisory]
- https://twitter.com/da5ch0/status/820161895269277696 [Broken Link]
- http://www.securityfocus.com/bid/94156 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1037243 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-132 [Patch, Vendor Advisory]
- https://twitter.com/da5ch0/status/820161895269277696 [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-7256
This product uses the NVD API but is not endorsed or certified by the NVD.