accept no compromises

Technical Cyber Security Alert 2010-12B

Technical Cyber Security Alert 2010-12B
Posted Jan 12, 2010
Authored by US-CERT | Site

Technical Cyber Security Alert 2010-12B - Microsoft has released updates to address a vulnerability in the Windows Embedded Open Type (EOT) font engine. Microsoft has also published an Advisory about multiple vulnerabilities in Adobe (Macromedia) Flash Player 6 that is included with Windows XP.

tags | advisory, vulnerability
systems | windows, xp
advisories | CVE-2010-0018
MD5 | d9a522110eac29f174a5b5c54bf4dad5

Technical Cyber Security Alert 2010-12B

Change Mirror Download

Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA10-012B

Microsoft Windows EOT Font and Adobe Flash Player 6 Vulnerabilities

Original release date:
Last revised: --
Source: US-CERT

Systems Affected

* Microsoft Windows and Internet Explorer
* Adobe (Macromedia) Flash Player 6


Microsoft has released updates to address a vulnerability in the
Windows Embedded Open Type (EOT) font engine. Microsoft has also
published an Advisory about multiple vulnerabilities in Adobe
(Macromedia) Flash Player 6 that is included with Windows XP.

I. Description

Microsoft Security Bulletin MS10-001 describes a vulnerability in
the Embedded Open Type (EOT) font engine in Windows. Microsoft
Security Advisory (979267) recommends that Windows XP users remove
or upgrade Adobe Flash Player 6 (formerly Macromedia Flash Player)
that is included with Windows XP. Vulnerability Note VU#204889
discusses one vulnerability in Flash Player 6 and provides several

These vulnerabilities could be exploited by loading specially
crafted fonts or Flash content via Internet Explorer.

Microsoft assigns the EOT font vulnerability a "low" severity
rating in most current versions of Windows and notes that reliable
code execution is unlikely. The severity rating for Windows 2000,
however, is "critical."

II. Impact

A remote, unauthenticated attacker could execute arbitrary code,
gain elevated privileges, or cause a vulnerable application to

III. Solution

Apply updates from Microsoft

Microsoft Security Bulletin MS10-001 provides updates for the EOT
font vulnerability. The security bulletin describes any known
issues related to the updates. Administrators are encouraged to
note these issues and test for any potentially adverse effects.
Administrators should consider using an automated update
distribution system such as Windows Server Update Services (WSUS).

Upgrade, Remove, or Disable Adobe Flash Player 6

Adobe Flash Player 6 is included with Windows XP. Adobe has
addresssed these vulnerabilities in newer versions of Flash Player.
Upgrade to a more recent version of Flash Player (such as Flash
Player 10). Alternatively, uninstall Flash Player or set the kill
bit for the Flash Player ActiveX control as described in Microsoft
Security Advisory (979267) and Vulnerability Note VU#204889.

IV. References

* Microsoft Security Bulletin Summary for January 2010 -

* Microsoft Security Bulletin MS10-001 -

* MS10-001: Font file decompression vulnerability -

* CVE-2010-0018 -

* Vulnerabilities in Adobe Flash Player 6 Provided in Windows XP
Could Allow Remote Code Execution -

* Vulnerability Note VU#204889 -

* Adobe Flash Player - <>

* How to uninstall the Adobe Flash Player plug-in and ActiveX control

* Windows Server Update Services (WSUS) -


The most recent version of this document can be found at:


Feedback can be directed to US-CERT Technical Staff. Please send
email to <> with "TA10-012B Feedback VU#552113" in
the subject.

For instructions on subscribing to or unsubscribing from this
mailing list, visit <>.

Produced 2010 by US-CERT, a government organization.

Terms of use:


Revision History

January 12, 2010: Initial release

Version: GnuPG v1.4.5 (GNU/Linux)



RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By