Microsoft Windows Kernel Mode Driver Denial Of Service Vulnerabilities

Summary

Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font, aka ‘Denial of Service in Windows Kernel Mode Driver Vulnerability.’

Credit:

The information has been provided by Secunia Research.


Details

Vulnerable Systems:
 * Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1

Microsoft Windows is vulnerable to a denial of service, caused by improper handling of TrueType font objects in memory by the Windows kernel mode driver. By persuading a victim to visit a specially crafted website or open a specially crafted file, a remote attacker could exploit this vulnerability to cause the system to stop responding.

CVE Information:
CVE-2014-6317

Disclosure Timeline:
Original release date: 11/11/2014
Last revised: 12/02/2014

Categories: Windows