| Title | Google Chrome で使用される Microsoft Windows のカーネルモードドライバにおける任意のコードを実行される脆弱性 |
|---|---|
| Summary | Google Chrome および他の製品で使用される Microsoft Windows のカーネルモードドライバは、メモリのオブジェクトを適切に処理しないため、任意のコードを実行される脆弱性が存在します。 マイクロソフトセキュリティ情報には、この脆弱性は「TrueType フォントの解析の脆弱性」と記載されています。 |
| Possible impacts | 第三者により、巧妙に細工された TrueType フォントファイルを介して、任意のコードを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 25, 2012, midnight |
| Registration Date | Sept. 28, 2012, 11:54 a.m. |
| Last Update | Nov. 16, 2012, 11:09 a.m. |
| CVSS2.0 : 危険 | |
| Score | 10 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| マイクロソフト |
| Microsoft Windows 7 (x32) SP1 以前 |
| Microsoft Windows 7 (x64) SP1 以前 |
| Microsoft Windows 8 for 32-bit Systems |
| Microsoft Windows 8 for 64-bit Systems |
| Microsoft Windows RT |
| Microsoft Windows Server 2003 (itanium) SP2 |
| Microsoft Windows Server 2003 (x64) SP2 |
| Microsoft Windows Server 2003 SP2 |
| Microsoft Windows Server 2008 (itanium) SP2 |
| Microsoft Windows Server 2008 (x64) SP2 |
| Microsoft Windows Server 2008 (x86) SP2 |
| Microsoft Windows Server 2008 r2(itanium) SP1 以前 |
| Microsoft Windows Server 2008 r2(x64) SP1 以前 |
| Microsoft Windows Server 2012 |
| Microsoft Windows Vista (x64) SP2 |
| Microsoft Windows Vista SP2 |
| Microsoft Windows XP (x64) SP2 |
| Microsoft Windows XP sp3 SP3 |
| Google Chrome 22.0.1229.79 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2012年09月28日] 掲載 [2012年10月22日] CVSS による深刻度:基本値と攻撃条件の複雑さ、機密性、完全性、可用性への影響を変更 CWE による脆弱性タイプ一覧:CWE-ID を変更 [2012年11月16日] タイトル:NVD の変更に伴い内容を更新 概要:NVD の変更に伴い内容を更新 想定される影響:NVD の変更に伴い内容を更新 影響を受けるシステム:マイクロソフト (MS12-075) の情報を追加 ベンダ情報:マイクロソフト (MS12-075) を追加[2012年11月16日] ベンダ情報:富士通 (TA12-318A) を追加 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT, as used by Google Chrome before 22.0.1229.79 and other programs, do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted TrueType font file, aka "Windows Font Parsing Vulnerability" or "TrueType Font Parsing Vulnerability." |
|---|---|
| Publication Date | Sept. 26, 2012, 7:56 p.m. |
| Registration Date | Jan. 28, 2021, 2:59 p.m. |
| Last Update | Nov. 21, 2024, 10:39 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | 22.0.1229.78 | ||||
| cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* | |||||