Advisory Details

August 14th, 2020

Microsoft Windows fontdrvhost Font Parsing Use-After-Free Remote Code Execution Vulnerability

ZDI-20-1003
ZDI-CAN-10816

CVE ID CVE-2020-1561
CVSS SCORE 5.0, AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of TTF fonts. A crafted TTF font can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code in the context of the user-mode font driver process.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1561
DISCLOSURE TIMELINE
  • 2020-05-07 - Vulnerability reported to vendor
  • 2020-08-14 - Coordinated public release of advisory
CREDIT kdot
BACK TO ADVISORIES