{"id":1812,"date":"2011-11-09T11:47:23","date_gmt":"2011-11-09T19:47:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=1812"},"modified":"2012-03-08T17:00:20","modified_gmt":"2012-03-09T01:00:20","slug":"coverage-information-for-microsoft-security-advisory-2639658","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2011\/11\/coverage-information-for-microsoft-security-advisory-2639658\/","title":{"rendered":"Coverage Information for Microsoft Security Advisory (2639658)"},"content":{"rendered":"<h3>Summary<\/h3>\n<p>Microsoft has published a Security Advisory (\"Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege\",\u00a0CVE-2011-3402) regarding a vulnerability in Microsoft Windows operating systems that can allow an attacker to craft a malicious TrueType font that can result in the execution of arbitrary code in kernel mode.<\/p>\n<p>Complete information from Microsoft is available at\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/advisory\/2639658\" rel=\"nofollow,noopener\"  target=\"_blank\">http:\/\/technet.microsoft.com\/en-us\/security\/advisory\/2639658<\/a>.<\/p>\n<h3><strong>Coverage Information<\/strong><\/h3>\n<p>Palo Alto Networks content update version 275 (released 11\/8\/11) provides signature-based detection of attempted exploitation of the vulnerability described in this Microsoft Security Advisory.<\/p>\n<p>The following signatures have been added to detect exploitation of this vulnerability:<\/p>\n<table>\n<tbody>\n<tr>\n<td>Severity<\/td>\n<td>ID<\/td>\n<td>Name<\/td>\n<td>CVE<\/td>\n<td>Default action<\/td>\n<\/tr>\n<tr>\n<td>critical<\/td>\n<td>34517<\/td>\n<td>Microsoft TrueType Font Rendering Memory Corruption Vulnerability<\/td>\n<td>CVE-2011-3402<\/td>\n<td>alert<\/td>\n<\/tr>\n<tr>\n<td>critical<\/td>\n<td>34518<\/td>\n<td>Microsoft TrueType Font Rendering Memory Corruption Vulnerability<\/td>\n<td>CVE-2011-3402<\/td>\n<td>alert<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Palo Alto Networks customers with a Threat Prevention subscription are advised to verify that they are running the latest content version on their devices. \u00a0If you have any questions about coverage for this advisory, please contact <a title=\"Palo Alto Networks support\" href=\"http:\/\/support.paloaltonetworks.com\" target=\"_blank\">support<\/a>.<\/p>\n<h3><strong>Revision History<\/strong><\/h3>\n<p>11\/9\/11 - Advisory posted<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Microsoft has published a Security Advisory (\"Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege\",\u00a0CVE-2011-3402) regarding a vulnerability in Microsoft Windows operating systems that can allow an attacker to craft &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[70],"coauthors":[889],"class_list":["post-1812","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-mapp"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1812"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1812\/revisions"}],"predecessor-version":[{"id":2199,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1812\/revisions\/2199"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1812"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=1812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}