- Description
- The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Data from CISA
- Vulnerability name
- Microsoft Windows Remote Code Execution Vulnerability
- Exploit added on
- May 25, 2022
- Exploit action due
- Jun 15, 2022
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA"
},
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "68C3652F-6730-44B0-8200-FA51D935BBA0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
"vulnerable": false,
"matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA"
},
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "68C3652F-6730-44B0-8200-FA51D935BBA0"
},
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "61FAD9EE-FA7F-4B39-8A9B-AFFAEC8BF214"
},
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.5.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "299DBEAE-1829-47A9-B09E-4AF327831B69"
},
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "40B3A045-B08A-44E0-91BE-726753F6A362"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"vulnerable": false,
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"vulnerable": false,
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1"
},
{
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"vulnerable": false,
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A0BB045C-AAC8-42F2-84A9-062630FA14E9"
},
{
"criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6C3ED4FC-2583-4E51-8931-082875A97034"
},
{
"criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8B854E18-7CB0-43F7-9EBF-E356FA176B2F"
},
{
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D6EF9A3D-4EB8-4B2E-B388-04CC0751A93F"
}
],
"operator": "OR"
}
]
}
]