Lucene search

K
cve[email protected]CVE-2012-2897
HistorySep 26, 2012 - 10:56 a.m.

CVE-2012-2897

2012-09-2610:56:05
CWE-119
web.nvd.nist.gov
46
cve-2012-2897
windows font parsing vulnerability
truetype font
memory vulnerability
remote code execution
nvd
google chrome

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.3 High

AI Score

Confidence

Low

0.566 Medium

EPSS

Percentile

97.7%

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT, as used by Google Chrome before 22.0.1229.79 and other programs, do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted TrueType font file, aka β€œWindows Font Parsing Vulnerability” or β€œTrueType Font Parsing Vulnerability.”

Affected configurations

NVD
Node
googlechromeRange≀22.0.1229.78
OR
googlechromeMatch22.0.1229.0
OR
googlechromeMatch22.0.1229.1
OR
googlechromeMatch22.0.1229.2
OR
googlechromeMatch22.0.1229.3
OR
googlechromeMatch22.0.1229.4
OR
googlechromeMatch22.0.1229.6
OR
googlechromeMatch22.0.1229.7
OR
googlechromeMatch22.0.1229.8
OR
googlechromeMatch22.0.1229.9
OR
googlechromeMatch22.0.1229.10
OR
googlechromeMatch22.0.1229.11
OR
googlechromeMatch22.0.1229.12
OR
googlechromeMatch22.0.1229.14
OR
googlechromeMatch22.0.1229.16
OR
googlechromeMatch22.0.1229.17
OR
googlechromeMatch22.0.1229.18
OR
googlechromeMatch22.0.1229.20
OR
googlechromeMatch22.0.1229.21
OR
googlechromeMatch22.0.1229.22
OR
googlechromeMatch22.0.1229.23
OR
googlechromeMatch22.0.1229.24
OR
googlechromeMatch22.0.1229.25
OR
googlechromeMatch22.0.1229.26
OR
googlechromeMatch22.0.1229.27
OR
googlechromeMatch22.0.1229.28
OR
googlechromeMatch22.0.1229.29
OR
googlechromeMatch22.0.1229.31
OR
googlechromeMatch22.0.1229.32
OR
googlechromeMatch22.0.1229.33
OR
googlechromeMatch22.0.1229.35
OR
googlechromeMatch22.0.1229.36
OR
googlechromeMatch22.0.1229.37
OR
googlechromeMatch22.0.1229.39
OR
googlechromeMatch22.0.1229.48
OR
googlechromeMatch22.0.1229.49
OR
googlechromeMatch22.0.1229.50
OR
googlechromeMatch22.0.1229.51
OR
googlechromeMatch22.0.1229.52
OR
googlechromeMatch22.0.1229.53
OR
googlechromeMatch22.0.1229.54
OR
googlechromeMatch22.0.1229.55
OR
googlechromeMatch22.0.1229.56
OR
googlechromeMatch22.0.1229.57
OR
googlechromeMatch22.0.1229.58
OR
googlechromeMatch22.0.1229.59
OR
googlechromeMatch22.0.1229.60
OR
googlechromeMatch22.0.1229.62
OR
googlechromeMatch22.0.1229.63
OR
googlechromeMatch22.0.1229.64
OR
googlechromeMatch22.0.1229.65
OR
googlechromeMatch22.0.1229.67
OR
googlechromeMatch22.0.1229.76
AND
microsoftwindows_7Match-
OR
microsoftwindows_7Match-sp1x64
OR
microsoftwindows_7Match-sp1x86
OR
microsoftwindows_8Match--x64
OR
microsoftwindows_8Match--x86
OR
microsoftwindows_rtMatch-
OR
microsoftwindows_server_2003sp2
OR
microsoftwindows_server_2008r2itanium
OR
microsoftwindows_server_2008r2x64
OR
microsoftwindows_server_2008sp2x64
OR
microsoftwindows_server_2008sp2x86
OR
microsoftwindows_server_2008Match-sp2itanium
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_vistasp2
OR
microsoftwindows_vistaMatch-sp2
OR
microsoftwindows_xpsp3
OR
microsoftwindows_xpMatch-sp2x64

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.3 High

AI Score

Confidence

Low

0.566 Medium

EPSS

Percentile

97.7%