Overview
- Description
- The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- Microsoft Windows Remote Code Execution Vulnerability
- Exploit added on
- May 25, 2022
- Exploit action due
- Jun 15, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68C3652F-6730-44B0-8200-FA51D935BBA0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*", "vulnerable": false, "matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68C3652F-6730-44B0-8200-FA51D935BBA0" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61FAD9EE-FA7F-4B39-8A9B-AFFAEC8BF214" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:4.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "299DBEAE-1829-47A9-B09E-4AF327831B69" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40B3A045-B08A-44E0-91BE-726753F6A362" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "vulnerable": false, "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "vulnerable": false, "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "vulnerable": false, "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0BB045C-AAC8-42F2-84A9-062630FA14E9" }, { "criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*", "vulnerable": true, "matchCriteriaId": "6C3ED4FC-2583-4E51-8931-082875A97034" }, { "criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B854E18-7CB0-43F7-9EBF-E356FA176B2F" }, { "criteria": "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6EF9A3D-4EB8-4B2E-B388-04CC0751A93F" } ], "operator": "OR" } ] } ]