| Summary | A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'. |
|---|---|
| Publication Date | July 15, 2020, 8:15 a.m. |
| Registration Date | Jan. 26, 2021, 11:52 a.m. |
| Last Update | Nov. 21, 2024, 2:10 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 8.8 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 6.8 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | はい |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:* | |||||
| Title | 複数の Microsoft Windows 製品におけるリモートでコードを実行される脆弱性脆弱性 |
|---|---|
| Summary | 複数の Microsoft Windows 製品には、Windows フォントライブラリが巧妙に細工されたフォントを適切に処理しない場合、リモートでコードを実行される脆弱性が存在します。 ベンダは、本脆弱性を「Windows フォント ライブラリのリモートでコードが実行される脆弱性」として公開しています。 |
| Possible impacts | 攻撃者により、リモートでコードを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | July 14, 2020, midnight |
| Registration Date | Sept. 3, 2020, 5:16 p.m. |
| Last Update | Sept. 3, 2020, 5:16 p.m. |
| マイクロソフト |
| Microsoft Windows 10 for 32-bit Systems |
| Microsoft Windows 10 for x64-based Systems |
| Microsoft Windows 10 Version 1607 for 32-bit Systems |
| Microsoft Windows 10 Version 1607 for x64-based Systems |
| Microsoft Windows 10 Version 1709 for 32-bit Systems |
| Microsoft Windows 10 Version 1709 for ARM64-based Systems |
| Microsoft Windows 10 Version 1709 for x64-based Systems |
| Microsoft Windows 10 Version 1803 for 32-bit Systems |
| Microsoft Windows 10 Version 1803 for ARM64-based Systems |
| Microsoft Windows 10 Version 1803 for x64-based Systems |
| Microsoft Windows 10 Version 1809 for 32-bit Systems |
| Microsoft Windows 10 Version 1809 for ARM64-based Systems |
| Microsoft Windows 10 Version 1809 for x64-based Systems |
| Microsoft Windows 10 Version 1903 for 32-bit Systems |
| Microsoft Windows 10 Version 1903 for ARM64-based Systems |
| Microsoft Windows 10 Version 1903 for x64-based Systems |
| Microsoft Windows 10 Version 1909 for 32-bit Systems |
| Microsoft Windows 10 Version 1909 for ARM64-based Systems |
| Microsoft Windows 10 Version 1909 for x64-based Systems |
| Microsoft Windows 10 Version 2004 for 32-bit Systems |
| Microsoft Windows 10 Version 2004 for ARM64-based Systems |
| Microsoft Windows 10 Version 2004 for x64-based Systems |
| Microsoft Windows 7 for 32-bit Systems SP1 |
| Microsoft Windows 7 for x64-based Systems SP1 |
| Microsoft Windows 8.1 for 32-bit systems |
| Microsoft Windows 8.1 for x64-based systems |
| Microsoft Windows RT 8.1 |
| Microsoft Windows Server version 1903 (Server Core installation) |
| Microsoft Windows Server version 1909 (Server Core installation) |
| Microsoft Windows Server version 2004 (Server Core installation) |
| Microsoft Windows Server 2008 for 32-bit Systems SP2 |
| Microsoft Windows Server 2008 for 32-bit Systems SP2 (Server Core installation) |
| Microsoft Windows Server 2008 for x64-based Systems SP2 |
| Microsoft Windows Server 2008 for x64-based Systems SP2 (Server Core installation) |
| Microsoft Windows Server 2008 R2 for x64-based Systems SP1 |
| Microsoft Windows Server 2008 R2 for x64-based Systems SP1 (Server Core installation) |
| Microsoft Windows Server 2012 |
| Microsoft Windows Server 2012 (Server Core installation) |
| Microsoft Windows Server 2012 R2 |
| Microsoft Windows Server 2012 R2 (Server Core installation) |
| Microsoft Windows Server 2016 |
| Microsoft Windows Server 2016 (Server Core installation) |
| Microsoft Windows Server 2019 (Server Core installation) |
| Microsoft Windows Server 2019 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2020年09月03日] 掲載 |
Sept. 3, 2020, 5:16 p.m. |