Microsoft yesterday issued a warning that attackers are exploiting a previously undisclosed security vulnerability found in all supported versions of Windows.
The company said that "limited targeted attacks" observed could leverage un-patched vulnerabilities in the Adobe Type Manager Library. The company provided a guidance to help reduce customer risk until the security update is released. Microsoft is working on a fix. Updates that address security vulnerabilities in Microsoft software are typically released on Update Tuesday, the second Tuesday of each month. The operating system versions that are affected by this vulnerability include Windows 7, but only enterprise users with extended security support will receive patches.
While Microsoft insures to work on a patch, affected users should initially protect themselves as follows:
- Deactivation of the preview in Windows Explorer
- Deactivation of the detail view in Windows Explorer
- Deactivation of the WebClient service via Services.msc
- Rename the library (atmfd.dll) of the Adobe Type Manager
In the meantime, the advisory offered a temporary workaround for affected Windows users to mitigate the flaw until a fix is available.
ADV200006 | Type 1 Font Parsing Remote Code Execution Vulnerability
Security Advisory
Microsoft is aware of limited targeted attacks that could leverage un-patched vulnerabilities in the Adobe Type Manager Library, and is providing the following guidance to help reduce customer risk until the security update is released.
Two remote code execution vulnerabilities exist in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.
There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane.
Microsoft is aware of this vulnerability and working on a fix. Updates that address security vulnerabilities in Microsoft software are typically released on Update Tuesday, the second Tuesday of each month. This predictable schedule allows for partner quality assurance and IT planning, which helps maintain the Windows ecosystem as a reliable, secure choice for our customers. The operating system versions that are affected by this vulnerability are listed below. Please see the mitigation and workarounds for guidance on how to reduce the risk.