SB2018041035 - Multiple vulnerabilities in Microsoft Graphics Component
Published: April 10, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2018-1010)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of embedded fonts by the Windows font library. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Improper input validation (CVE-ID: CVE-2018-1012)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of embedded fonts by the Windows font library. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
3) Improper input validation (CVE-ID: CVE-2018-1013)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to improper handling of embedded fonts by the Windows font library. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
4) Improper input validation (CVE-ID: CVE-2018-1015)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to improper handling of embedded fonts by the Windows font library. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
5) Improper input validation (CVE-ID: CVE-2018-1016)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to improper handling of embedded fonts by the Windows font library. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
6) Memory corruption (CVE-ID: CVE-2018-8116)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory. A remote attacker can trigger memory corruption and cause the system to stop responding.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1010
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1012
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1013
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1015
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1016
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8116