Advertisement






Microsoft Windows 'LoadUvsTable()' Heap-based Buffer Overflow

CVE Category Price Severity
CVE-2016-7274 CWE-122 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2017-03-16
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.8 0.912

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017030152

Below is a copy:

Microsoft Windows 'LoadUvsTable()' Heap-based Buffer Overflow# Date: 15-03-2017
# Author: Hossein Lotfi (https://twitter.com/hosselot)
# CVE: CVE-2016-7274
 
1. Description
 
An integer overflow error within the "LoadUvsTable()" function of usp10.dll
can be exploited to cause a heap-based buffer overflow. Full analysis is
available at:
 
http://blogs.flexerasoftware.com/secunia-research/2016/12/microsoft_windows_loaduvstable_heap_based_buffer_overflow_vulnerability.html
 
 
2. Proof of Concept
 
open C:\Windows\Fonts\phagspa.ttf in a hex editor and change the value at
offset 0x2051 from 0x00000006 to 0x33333334.
 
 
3. Solution:
 
Microsoft initially tried to fixed the issue in MS16-147, but the fix was
incomplete and the issue remained unpatched til Microsoft March 2017 patch
release:
 
https://twitter.com/hosselot/status/809059287037251584
 
It appears MS17-013 finally fixed the vulnerability properly:
 
https://technet.microsoft.com/en-us/library/security/ms17-013.aspx
 
@hosselot


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum