Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
22 Apr 2026, 10:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://blogs.mcafee.com/mcafee-labs/the-day-of-the-golden-jackal-%E2%80%93-further-tales-of-the-stuxnet-files - Broken Link | |
| References | () http://blogs.technet.com/b/msrc/archive/2011/11/03/microsoft-releases-security-advisory-2639658.aspx - Vendor Advisory | |
| References | () http://isc.sans.edu/diary/Duqu+Mitigation/11950 - Third Party Advisory | |
| References | () http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two - Not Applicable | |
| References | () http://www.securitytracker.com/id?1027039 - Broken Link | |
| References | () http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit - Not Applicable | |
| References | () http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf - Not Applicable | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 - Vendor Advisory | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034 - Vendor Advisory | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039 - Vendor Advisory | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13998 - Broken Link | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15290 - Broken Link | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15645 - Broken Link | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2011-3402 - US Government Resource | |
| CPE | cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* |
22 Oct 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Oct 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.8 |
21 Nov 2024, 01:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://blogs.mcafee.com/mcafee-labs/the-day-of-the-golden-jackal-%E2%80%93-further-tales-of-the-stuxnet-files - | |
| References | () http://blogs.technet.com/b/msrc/archive/2011/11/03/microsoft-releases-security-advisory-2639658.aspx - | |
| References | () http://isc.sans.edu/diary/Duqu+Mitigation/11950 - | |
| References | () http://secunia.com/advisories/49121 - Vendor Advisory | |
| References | () http://secunia.com/advisories/49122 - Vendor Advisory | |
| References | () http://technet.microsoft.com/security/advisory/2639658 - Vendor Advisory | |
| References | () http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two - | |
| References | () http://www.securitytracker.com/id?1027039 - | |
| References | () http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit - | |
| References | () http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf - | |
| References | () http://www.us-cert.gov/cas/techalerts/TA11-347A.html - US Government Resource | |
| References | () http://www.us-cert.gov/cas/techalerts/TA12-129A.html - US Government Resource | |
| References | () http://www.us-cert.gov/cas/techalerts/TA12-164A.html - US Government Resource | |
| References | () http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-291-01E.pdf - US Government Resource | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 - | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034 - | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13998 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15290 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15645 - |
07 Dec 2023, 18:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE |
Information
Published : 2011-11-04 21:55
Updated : 2026-04-22 10:36
NVD link : CVE-2011-3402
Mitre link : CVE-2011-3402
CVE.ORG link : CVE-2011-3402
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_xp
- windows_7
- windows_server_2003
- windows_vista
CWE
