
====================================================================

                           CERT-Renater

               Note d'Information No. 2015/VULN155
_____________________________________________________________________

DATE                : 15/07/2015
OLE objects HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Windows version Server 2003, Vista, Server 2008, 7,
                8, 8.1, Server 2012, RT, RT 8.1 running ATM Font Driver.

======================================================================
KB3077657
https://technet.microsoft.com/en-us/library/security/MS15-077
______________________________________________________________________

Microsoft Security Bulletin MS15-077: Vulnerability in ATM Font Driver
Could Allow Elevation of Privilege (3077657)

Bulletin Number: MS15-077

Bulletin Title: Vulnerability in ATM Font Driver Could Allow Elevation
of Privilege

Severity: Important

KB Article: 3077657

Version: 1.0

Published Date: July 14, 2015

Executive Summary

This security update resolves a vulnerability in Microsoft Windows. The
vulnerability could allow elevation of privilege if an attacker logs on
to a target system and runs a specially crafted application. An attacker
who successfully exploited this vulnerability could execute arbitrary
code and take complete control of an affected system. An attacker could
then install programs; view, change, or delete data; or create new
accounts with full user rights.

This security update is rated Important for all supported releases of
Microsoft Windows For more information, see the Affected Software section.


Affected Software

Windows Server 2003

Windows Server 2003 Service Pack 2

Windows Server 2003 x64 Edition Service Pack 2

Windows Server 2003 with SP2 for Itanium-based Systems

Windows Vista

Windows Vista Service Pack 2

Windows Vista x64 Edition Service Pack 2

Windows Server 2008

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for Itanium-based Systems Service Pack 2

Windows 7

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows Server 2008 R2

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1

Windows 8 and Windows 8.1

Windows 8 for 32-bit Systems

Windows 8 for x64-based Systems

Windows 8.1 for 32-bit Systems

Windows 8.1 for x64-based Systems

Windows Server 2012 and Windows Server 2012 R2

Windows Server 2012

Windows Server 2012 R2

Windows RT and Windows RT 8.1

Windows RT[1]

Windows RT 8.1[1]

Server Core installation option

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation)

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation)

Windows Server 2008 R2 for x64-based Systems Service 3067505Pack 1
(Server Core installation)

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2 (Server Core installation)

[1]This update is available via Windows Update only.


Vulnerability Information

ATMFD.DLL Memory Corruption Vulnerability - CVE-2015-2387

An elevation of privilege vulnerability exists in Adobe Type Manager
Font Driver (ATMFD) when it fails to properly handle objects in memory.
An attacker who successfully exploited this vulnerability could execute
arbitrary code and take complete control of an affected system. An
attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights.

To exploit the vulnerability, an attacker would first have to log on to
a target system and then run a specially crafted application. The
security update addresses the vulnerability by correcting how ATMFD
handles objects in memory.

This vulnerability has been publicly disclosed. It has been assigned
Common Vulnerability and Exposure number CVE-2015-2387. When this
bulletin was originally released, Microsoft was aware of limited,
targeted attacks that attempt to exploit this vulnerability.

=========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================
