"MS.Windows.GDI.Component.TTF.File.Handling.Code.Execution"
- 特征库ID:
43217
- 漏洞级别:
high
- CVE ID:
CVE-2016-3393
- 建议的动作:
drop
- 受影响的系统:
Windows
- 协议:
tcp
攻击漏洞描述
这表示攻击企图利用 Microsoft Windows 中的代码执行漏洞。该漏洞是由于易受攻击的软件处理恶意制作的 TTF 文件时发生的错误。远程攻击者可能能够通过精心制作的 TTF 文件在易受攻击的系统上执行任意代码。
影响范围
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012 and Windows Server 2012 R2
Windows RT 8.1
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
可能带来的后果
系统被入侵:远程攻击者可以控制易受攻击的系统。
解决办法
应用供应商提供的最新升级或补丁。 https://technet.microsoft.com/en-us/library/security/MS16-120