headerIMG

B2B Articles - Nov 5, 2011 12:18:38 PM - By Ironpaper

Before patch, a work-around for Win32k TrueType font parsing engine

Microsoft has issued a work-around for the attack against the Win32k TrueType font parsing engine, which is an advanced piece of malicious software still undergoing analysis by researchers.

As Microsoft builds a patch for the vulnerability, they have issued a temporary work-around to "blunt" attacks against the Win32k TrueType font parsing engine--Duqu attacks. This attack can be delivered by a malicious Microsoft Word document, which could easily be sent as an email attachment or distributed by a website download.

Microsoft's workarounds are a few lines of code that run at an administrative command prompt. But, by running the code, it would cause some  applications that rely on embedded font technology to not run correctly or display properly.

The workarounds apply to Microsoft's XP, Vista and 7 operating systems as well as to various Windows Server products.

Tel 212-993-7809  

Ironpaper ®
10 East 33rd Street 
6th Floor
New York, NY 10016
Map

Ironpaper - B2B Agency

B2B Marketing and Growth Agency.

Grow your B2B business boldly. Ironpaper is a B2B marketing agency. We build growth engines for marketing and sales success. We drive demand generation campaigns, ABM programs, B2B content, sales enablement, qualified leads, and B2B marketing efforts. 

Ironpaper Twitter Ironpaper Linkedin