Vulnerability Name:

CVE-2011-3402 (CCN-71073)

Assigned:2011-10-11
Published:2011-10-11
Updated:2020-09-28
Summary:Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability."
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Access
References:Source: MISC
Type: UNKNOWN
http://blogs.mcafee.com/mcafee-labs/the-day-of-the-golden-jackal-%E2%80%93-further-tales-of-the-stuxnet-files

Source: CONFIRM
Type: UNKNOWN
http://blogs.technet.com/b/msrc/archive/2011/11/03/microsoft-releases-security-advisory-2639658.aspx

Source: MITRE
Type: CNA
CVE-2011-3402

Source: CCN
Type: Metasploit Modules
Post Windows Gather Forensics Duqu Registry Check

Source: MISC
Type: UNKNOWN
http://isc.sans.edu/diary/Duqu+Mitigation/11950

Source: CCN
Type: SA46724
Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

Source: CCN
Type: SA48429
Microsoft Lync / Office Communicator Multiple Vulnerabilities

Source: CCN
Type: SA49121
Microsoft Office Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
49121

Source: CCN
Type: SA49122
Microsoft Silverlight Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
49122

Source: CCN
Type: Microsoft Security Advisory (2639658)
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege

Source: CCN
Type: Microsoft Security Bulletin MS11-087
Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2639417)

Source: CCN
Type: Microsoft Security Bulletin MS12-008
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2660465)

Source: CCN
Type: Microsoft Security Bulletin MS12-018
Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2641653)

Source: CCN
Type: Microsoft Security Bulletin MS12-034
Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)

Source: CCN
Type: Microsoft Security Bulletin MS12-039
Vulnerabilities in Lync Could Allow Remote Code Execution (2707956)

Source: CCN
Type: Microsoft Security Bulletin MS12-066
Vulnerabilities in HTML Sanitization Component Could Allow Elevation of Privilege (2741517)

Source: CCN
Type: Microsoft Security Bulletin MS12-076
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2720184)

Source: CCN
Type: Microsoft Security Bulletin MS13-022
Vulnerability in Silverlight Could Allow Remote Code Execution (2814124)

Source: CCN
Type: Microsoft Security Bulletin MS13-024
Vulnerabilities in SharePoint Could Allow Elevation of Privilege (2780176)

Source: CCN
Type: Microsoft Security Bulletin MS13-035
Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2821818)

Source: CCN
Type: Microsoft Security Bulletin MS13-041
Vulnerability in Lync Could Allow Remote Code Execution (2834695)

Source: CCN
Type: Microsoft Security Bulletin MS13-054
Vulnerability in Windows Components Could Allow Remote Code Execution (2848295)

Source: CCN
Type: Microsoft Security Bulletin MS13-067
Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2834052)

Source: CCN
Type: Microsoft Security Bulletin MS13-073
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300)

Source: CCN
Type: Microsoft Security Bulletin MS13-084
Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2885089)

Source: CCN
Type: Microsoft Security Bulletin MS13-085
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080)

Source: CCN
Type: Microsoft Security Bulletin MS14-032
Vulnerability in Microsoft Lync Could Allow Information Disclosure

Source: CCN
Type: Microsoft Security Bulletin MS14-038
Vulnerability in Windows Journal Could Allow Remote Code Execution (2975689)

Source: CCN
Type: Microsoft Security Bulletin MS14-073
Vulnerability in Microsoft SharePoint Server Could Allow Elevation of Privilege (3000431)

Source: CCN
Type: Microsoft Security Bulletin MS14-083
Vulnerabilities in MicrosoftExcel Could Allow Remote Code Execution (3017347)

Source: CCN
Type: Microsoft Security Bulletin MS15-116
Security Updates for Microsoft Office to Address Remote Code Execution (3104540)

Source: CCN
Type: Microsoft Security Bulletin MS15-131
Security Update for Microsoft Office to Address Remote Code Execution (3116111)

Source: CCN
Type: Microsoft Security Bulletin MS16-004
Security Update for Microsoft Office to Address Remote Code Execution - Critical (3124585)

Source: CCN
Type: Microsoft Security Bulletin MS16-015
Security Update for Microsoft Office to Address Remote Code Execution (3134226)

Source: CCN
Type: Microsoft Security Bulletin MS16-029
Security Update for Microsoft Office to Address Remote Code Execution (3141806)

Source: CCN
Type: Microsoft Security Bulletin MS16-042
Security Update for Microsoft Office (3148775)

Source: CCN
Type: Microsoft Security Bulletin MS16-054
Security Update for Microsoft Office (3155544)

Source: CCN
Type: Microsoft Security Bulletin MS16-070
Security Update for Office (3163610)

Source: CCN
Type: Microsoft Security Bulletin MS16-088
Security Updates for Office (3170008)

Source: CCN
Type: Microsoft Security Bulletin MS16-099
Security Update for Office (3177451)

Source: CCN
Type: Microsoft Security Bulletin MS16-107
Security Update for Microsoft Office (3185852)

Source: CCN
Type: Microsoft Security Bulletin MS16-121
Security Update for Microsoft Office (3194063)

Source: CCN
Type: Microsoft Security Bulletin MS16-133
Security Update for Microsoft Office (3199168)

Source: CCN
Type: Microsoft Security Bulletin MS16-148
Security Update for Microsoft Office (3204068)

Source: CCN
Type: Microsoft Security Bulletin MS17-002
Security Update for Microsoft Office (3214291)

Source: CCN
Type: Microsoft Security Bulletin MS17-013
Security Update for Microsoft Graphics Component (4013075)

Source: CCN
Type: Microsoft Security Bulletin MS17-014
Security Update for Microsoft Office (4013241)

Source: CONFIRM
Type: Vendor Advisory
http://technet.microsoft.com/security/advisory/2639658

Source: CCN
Type: Microsoft Web site
Microsoft Windows

Source: MISC
Type: UNKNOWN
http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two

Source: CCN
Type: BID-50462
Microsoft Windows 'Win32k.sys' TrueType Font Handling Remote Code Execution Vulnerability

Source: SECTRACK
Type: UNKNOWN
1027039

Source: MISC
Type: UNKNOWN
http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit

Source: MISC
Type: UNKNOWN
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf

Source: CCN
Type: Symantec Web site
W32.Duqu

Source: CERT
Type: US Government Resource
TA11-347A

Source: CERT
Type: US Government Resource
TA12-129A

Source: CERT
Type: US Government Resource
TA12-164A

Source: MISC
Type: US Government Resource
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-291-01E.pdf

Source: MS
Type: UNKNOWN
MS11-087

Source: MS
Type: UNKNOWN
MS12-034

Source: MS
Type: UNKNOWN
MS12-039

Source: XF
Type: UNKNOWN
ms-win-duqu-code-execution(71073)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:13998

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:15290

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:15645

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:*
  • OR cpe:/o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_7:-:*:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
  • OR cpe:/a:microsoft:lync:2010:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:lync:2010:*:attendee:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:15645
    V
    TrueType Font Parsing Vulnerability (CVE-2011-3402)
    2015-08-10
    oval:org.mitre.oval:def:15290
    V
    TrueType Font Parsing Vulnerability (CVE-2011-3402)
    2014-08-18
    oval:org.mitre.oval:def:13998
    V
    Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege
    2013-05-06
    BACK
    microsoft windows 7 - sp1
    microsoft windows 7 - sp1
    microsoft windows server 2003 * sp2
    microsoft windows server 2008 * sp2
    microsoft windows server 2008 * sp2
    microsoft windows server 2008 - sp2
    microsoft windows vista * sp2
    microsoft windows vista * sp2
    microsoft windows xp * sp2
    microsoft windows xp * sp3
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows xp sp2
    microsoft windows server 2008 -
    microsoft windows xp sp3
    microsoft windows vista - sp2
    microsoft windows vista - sp2
    microsoft windows server 2008 sp2
    microsoft windows server 2008 sp2
    microsoft windows 7 -
    microsoft windows server 2008 - r2
    microsoft windows server 2008 r2
    microsoft windows server 2008
    microsoft windows 7 - sp1
    microsoft windows server 2008 r2 sp1
    microsoft windows server 2008 r2 sp1
    microsoft lync 2010
    microsoft lync 2010
    microsoft windows server 2012
    microsoft windows 8 *