Governance & Risk Management , IT Risk Management , Patch Management

Microsoft Patches Windows Remote Code Flaw

The Flaw in Windows Graphics Component Can Enable Web-Based Attacks
Microsoft Patches Windows Remote Code Flaw

Microsoft has patched a critical vulnerability in Windows that can be exploited by tricking users to visit websites that use a malicious font. The flaw was found by Google's Project Zero bug-hunting team.

See Also: Finding and Managing the Risk in your IT Estate: A Comprehensive Overview

The vulnerability, CVE-2021-24093, is a remote code flaw in a Windows Graphics Component that affects multiple Windows 10 versions. Microsoft, which released a patch for the flaw on Tuesday, notes the vulnerability has a CVSS score of 8.8 - considered critical.

Hackers can exploit the flaw to wage web-based attacks, Microsoft says.

"In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability," the company says.

Hackers likely would spread links to malicious websites via phishing emails or Instant Messenger, according to Microsoft.

Vulnerability Explained

In a report describing the vulnerability, Google researchers Dominik Röttsches and Mateusz Jurczyk describe how they identified and reported the flaw to Microsoft in November.

The researchers note the vulnerability is present in Microsoft DirectWrite, a Windows API for high-quality text rendering. The API is widely used in desktop programs, such as Chrome, Firefox and Edge on Windows.

Their analysis revealed the vulnerability arises when the impacted browsers display a font called Glyphs from web fronts. "When these browsers display glyphs from web fonts, they pass on web font binary data to DirectWrite and execute it in their rendering processes," the Google researchers note. "Thus, the possibility to leverage a memory corruption for code execution extends to a remote attacker on condition that such an attacker succeeds in steering the user to content that downloads and displays a malicious font."

The researchers also note they successfully exploited the flaw in a fully patched Windows 10 installation and released a proof of concept for the exploit.

Similar Vulnerabilities

Microsoft has patched several other critical vulnerabilities caused by fonts.

In April 2020, Microsoft alerted its users about three zero-day flaws located in the Adobe Type Manager Library that allowed Windows users to render different types of fonts, called PostScript Type 1, within their devices. The company patched the vulnerabilities after attackers were found exploiting two of the zero-day flaws (see: Microsoft Alert: Fresh Zero-Day Flaws Found in Windows).

"Microsoft Windows has had similar vulnerabilities for decades and few of them became very widespread," says Roger Grimes, defense evangelist at security firm KnowBe4.

The prompt patching of the recently identified flaw reduces the risk it will be exploited, he says. "This is not to say that it won’t be abused and won't result in computers being compromised, but nothing known about it screams that it's going to be a 'bad' exploit widely abused."


About the Author

Akshaya Asokan

Akshaya Asokan

Senior Correspondent, ISMG

Asokan is a U.K.-based senior correspondent for Information Security Media Group's global news desk. She previously worked with IDG and other publications, reporting on developments in technology, minority rights and education.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.