Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; Live Meeting 2007 Console; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4.5.2, and 4.6; and Silverlight 5 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "True Type Font Parsing Information Disclosure Vulnerability."
Vector
NETWORK
Complexity
LOW
Authentication
NONE
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE
Microsoft Windows RT 8.1
Microsoft Windows 8.1 (not an official CPE)
Microsoft Windows 7 - Sp1 (not an official CPE)
Microsoft Windows 10 1511 (not an official CPE)
Microsoft Windows 10 1607 (not an official CPE)
Microsoft Windows 10 - (not an official CPE)
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows Server 2012
Microsoft Windows server 2012 R2 (not an official CPE)
Microsoft Windows Vista Service Pack 2
Microsoft Word viewer - (not an official CPE)
Microsoft Skype for business 2016 (not an official CPE)
Microsoft Office 2010 Sp2 (not an official CPE)
Microsoft Silverlight 5.0 (not an official CPE)
Microsoft Office 2007 Service Pack 3
Microsoft Lync 2013 Sp1 (not an official CPE)
Microsoft Lync 2010 Attendee client
Microsoft Lync 2010 (not an official CPE)
Microsoft Live meeting 2007 (not an official CPE)
Microsoft .net framework 4.6 (not an official CPE)
Microsoft .net framework 4.5.2 (not an official CPE)
Microsoft .net Framework 3.5.1
Microsoft .net Framework 3.5
Microsoft .NET Framework Version 3.0 Service Pack 2
Microsoft - Windows rt 8.1
Microsoft - Windows 8.1
Microsoft - Windows 7
Microsoft - Windows 10
Microsoft - Word viewer
Microsoft - Skype for business
Microsoft - Office
Microsoft - Silverlight
Microsoft - Lync
Microsoft - Live meeting
Microsoft - .net framework
Microsoft - Windows server 2008
Microsoft - Windows server 2012
Microsoft - Windows vista
Information Exposure (ID 200)
Related CAPEC 7
Subverting Environment Variable Values (CAPEC-ID 13)
Footprinting (CAPEC-ID 169)
Exploiting Trust in Client (aka Make the Client Invisible) (CAPEC-ID 22)
Browser Fingerprinting (CAPEC-ID 472)
Session Credential Falsification through Prediction (CAPEC-ID 59)
Reusing Session IDs (aka Session Replay) (CAPEC-ID 60)
Using Slashes in Alternate Encoding (CAPEC-ID 79)