Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2019-1412: OpenType Font Driver Information Disclosure Vulnerability

Back to Search

Microsoft CVE-2019-1412: OpenType Font Driver Information Disclosure Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
11/12/2019
Created
11/13/2019
Added
11/12/2019
Modified
11/18/2019

Description

An information disclosure vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. To exploit this vulnerability, an attacker would have to log on to an affected system and open a document containing specially crafted fonts. The update addresses the vulnerability by correcting how ATMFD.dll handles objects in memory.

Solution(s)

  • msft-kb4525233-34a5a286-7aae-469a-b1ac-0dbd98b48c9c
  • msft-kb4525233-357b9972-1dd5-46b6-b9fe-673f633e8a66
  • msft-kb4525233-3afe4f42-95e2-4768-af34-961a45c232a5
  • msft-kb4525233-676c08bf-e63d-48fe-b1f2-72b66ff22d0a
  • msft-kb4525233-682289d3-16c4-4e74-8f67-749cc358025c
  • msft-kb4525233-a9622cac-8e55-4fd3-bc1c-715655fde5a5
  • msft-kb4525239-5d291263-6be8-4c4c-b375-01b786fc7181
  • msft-kb4525239-abb20615-fb10-4359-9dea-631b15cabb37
  • msft-kb4525239-d1be2ef4-66c3-414f-a06a-10323a6a6225
  • msft-kb4525250-39712f55-86cb-4200-9005-8d57cd91032e
  • msft-kb4525250-a30c9519-8359-48e1-86d4-38791ad95200
  • msft-kb4525250-c95046b7-a6dd-4d23-9b73-68722b2533f4
  • msft-kb4525253-9cf980a2-7b40-426a-8253-4aca7b538ef6
  • msft-kb4525253-b11910e5-0a1d-4bdd-b307-3a56d5e3f1ee
  • msft-kb4525253-daab0091-1e65-4624-b280-015c007f30c1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;