7.8
CVSSv3

CVE-2016-3301

Published: 09/08/2016 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote malicious users to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft skype for business 2016

microsoft word viewer

microsoft windows rt 8.1

microsoft windows server 2012 r2

microsoft office 2007

microsoft office 2010

microsoft windows 8.1

microsoft windows vista

microsoft lync 2010

microsoft windows 10 1511

microsoft windows server 2012 -

microsoft windows server 2008 r2

microsoft lync 2013

microsoft live meeting 2007

microsoft windows 10 1607

microsoft windows 10 -

microsoft windows 7

microsoft windows server 2008

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=824 The GDI+ library can handle bitmaps originating from untrusted sources through a variety of attack vectors, like EMF files, which may embed bitmaps in records such as EMR_PLGBLT, EMR_BITBLT, EMR_STRETCHBLT, EMR_STRETCHDIBITS etc The GDI+ implementation supports bitmaps compress ...