The kernel-mode drivers in Microsoft Windows XP SP2 and...
High severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Jan 16, 2025
Description
Published by the National Vulnerability Database
Oct 9, 2013
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Jan 16, 2025
The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability."
References