|
|
|
|
| |
Credit:
The information has been provided by Khaled M. Salameh.
The original article can be found at: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0156
|
| |
Vulnerable Systems:
* Windows Vista Service Pack 2
* Windows Vista x64 Edition Service Pack 2
* Windows Server 2008 for 32-bit Systems Service Pack 2
* Windows Server 2008 for x64-based Systems Service Pack 2
* Windows 7 for 32-bit Systems
* Windows 7 for 32-bit Systems Service Pack 1
* Windows 7 for x64-based Systems
* Windows 7 for x64-based Systems Service Pack 1
* Windows Server 2008 R2 for x64-based Systems
* Windows Server 2008 R2 for x64-based Systems Service Pack 1
* Windows Server 2008 R2 for Itanium-based Systems
* Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Immune Systems:
* Windows XP Service Pack 3
* Windows XP Professional x64 Edition Service Pack 2
* Windows Server 2003 Service Pack 2
* Windows Server 2003 x64 Edition Service Pack 2
* Windows Server 2003 with SP2 for Itanium-based Systems
* Windows Server 2008 for Itanium-based Systems Service Pack 2
DirectWrite in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly render Unicode characters, which allows remote attackers to cause a denial of service (application hang) via a (1) instant message or (2) web site, aka "DirectWrite Application Denial of Service Vulnerability."
Vendor Status:
Microsoft has issued an update to correct this vulnerability.
Patch Availability:
http://technet.microsoft.com/en-us/security/bulletin/ms12-019
CVE Information:
CVE-2012-0156
|
|
|
|
|