SB2017101006 - Multiple vulnerabilities in Microsoft Graphics Component
Published: October 10, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2017-11763)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to input validation error the Windows font library improperly handles specially crafted embedded fonts. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Information disclosure (CVE-ID: CVE-2017-8693)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to an error when the Microsoft Windows Graphics Component improperly handles objects in memory. A local attacker can run a specially crafted application and gain access to potentially sensitive information.
3) Memory corruption (CVE-ID: CVE-2017-11824)
The vulnerability allows a local attacker to execute arbitrary code on the target system.The vulnerability exists due to boundary error when the Windows Graphics Component improperly handles objects in memory. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with SYSTEM privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Improper input validation (CVE-ID: CVE-2017-11762)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of specially crafted embedded fonts by the Windows font library. A remote attacker can send a specially crafted content, trick the victim into opening it and execute arbitrary code with SYSTEM privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11763
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8693
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11824
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11762