{"vuid":"VU#103336","idnumber":"103336","name":"Windows Adobe Type Manager privilege escalation vulnerability","keywords":["atmfd.dll","hackingteam","elevator.c","elevator.exe"],"overview":"The Adobe Type Manager module contains a memory corruption vulnerability, which can allow an attacker to obtain SYSTEM privileges on an affected Windows system.","clean_desc":"Adobe Type Manager, which is provided by atmfd.dll, is a kernel module that is provided by Windows and provides support for OpenType fonts. A memory-corruption flaw in Adobe Type Manager allows for manipulation of Windows kernel memory, which can result in a wide range of impacts. Although not related to this specific vulnerability, the j00ru//vx tech blog has details about the Adobe Type Manager Font Driver. Note that exploit code for this vulnerability is publicly available, as part of the HackingTeam compromise. We have confirmed that the exploit code successfully obtains SYSTEM privileges on Windows XP through Windows 8.1 systems, both 32-bit and 64-bit.","impact":"This vulnerability can allow an attacker to gain SYSTEM privileges on an affected Windows system. This can be used to bypass web browser and other OS-level sandboxing and protections.","resolution":"Apply an update This issue is addressed in Microsoft Security Bulletin MS15-077. Please see this document for update and workaround information.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Will Dormann.","public":["https://technet.microsoft.com/en-us/library/security/MS15-077","http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/","http://j00ru.vexillium.org/?p=2520"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-07-08T14:52:00Z","publicdate":"2015-07-05T00:00:00Z","datefirstpublished":"2015-07-08T16:09:27Z","dateupdated":"2015-07-14T19:19:13Z","revision":19,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"H","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:L/AC:L/Au:S/C:C/I:C/A:C","cvss_temporalscore":"6.8","cvss_environmentalscore":"6.769545216","cvss_environmentalvector":"CDP:ND/TD:H/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}