An information disclosure vulnerability exists in the way that the Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that while this vulnerability would not allow an attacker to either execute code or to elevate user rights directly, it could be used to obtain information in an attempt to further compromise the affected system.
To exploit this vulnerability, an attacker would have to log on to an affected system and open a document containing specially crafted fonts.
The security update addresses the vulnerability by correcting how the Windows EOT font engine handles embedded fonts.