Detect date
11/06/2011
Class
Exploit
Platform
Win32

Parent class: Malware

Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.

Read more

Class: Exploit

Exploits are programs that contain data or executable code which take advantage of one or more vulnerabilities in software running on a local or remote computer for clearly malicious purposes. Often, malicious users employ an exploit to penetrate a victim computer in order to subsequently install malicious code (for example, to infect all visitors to a compromised website with a malicious program). Additionally, exploits are commonly used by Net-Worms in order to hack a victim computer without any action being required from the user. Nuker programs are notable among exploits; such programs send specially crafted requests to local or remote computers, causing the system to crash.

Read more

Platform: Win32

Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.

Description

This family includes malicious code that attempts to exploit a vulnerability in the Win32 TrueType font-parsing engine of the Microsoft Windows component "Win32k.sys". An attacker that successfully exploits this vulnerability can run arbitrary code in kernel mode.

Top 10 countries with most attacked users (% of total attacks)

1
Korea, Republic of
59.07%
2
Vietnam
7.82%
3
United States
4.03%
4
Japan
2.88%
5
Germany
2.47%
6
Brazil
1.52%
7
Russian Federation
1.36%
8
France
1.03%
9
Mexico
1.03%
10
Spain
1.03%

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky IT Security Calculator
Calculate
Check now
Learn more about cybersecurity on Kaspersky Encyclopedia
For free
Learn more
Confirm changes?
Your message has been sent successfully.