CVE-2016-7210
Published on: 11/10/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:06 PM UTC
Certain versions of Windows 10 from Microsoft contain the following vulnerability:
atmfd.dll in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted Open Type font on a web site, aka "Open Type Font Information Disclosure Vulnerability."
- CVE-2016-7210 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | LOW | NONE | REQUIRED | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | HIGH | NONE | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
SecurityFocus | web.archive.org text/html Inactive LinkNot Archived |
![]() |
Microsoft Windows Open Type Font CVE-2016-7210 Information Disclosure Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
Microsoft Graphics Component Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker | www.securitytracker.com text/html |
![]() |
Microsoft Security Bulletin MS16-132 - Critical | Microsoft Docs | docs.microsoft.com text/html |
![]() |
Computer Security Research - Secunia | secuniaresearch.flexerasoftware.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Microsoft | Windows 10 | - | All | All | All |
Operating System | Microsoft | Windows 10 | 1511 | All | All | All |
Operating System | Microsoft | Windows 10 | 1607 | All | All | All |
Operating System | Microsoft | Windows 10 | - | All | All | All |
Operating System | Microsoft | Windows 10 | 1511 | All | All | All |
Operating System | Microsoft | Windows 10 | 1607 | All | All | All |
Operating System | Microsoft | Windows 7 | All | sp1 | All | All |
Operating System | Microsoft | Windows 7 | All | sp1 | All | All |
Operating System | Microsoft | Windows 8.1 | All | All | All | All |
Operating System | Microsoft | Windows 8.1 | All | All | All | All |
Operating System | Microsoft | Windows Rt 8.1 | All | All | All | All |
Operating System | Microsoft | Windows Rt 8.1 | All | All | All | All |
Operating System | Microsoft | Windows Server 2008 | All | sp2 | All | All |
Operating System | Microsoft | Windows Server 2008 | r2 | sp1 | All | All |
Operating System | Microsoft | Windows Server 2008 | All | sp2 | All | All |
Operating System | Microsoft | Windows Server 2008 | r2 | sp1 | All | All |
Operating System | Microsoft | Windows Server 2012 | - | All | All | All |
Operating System | Microsoft | Windows Server 2012 | r2 | All | All | All |
Operating System | Microsoft | Windows Server 2012 | - | All | All | All |
Operating System | Microsoft | Windows Server 2012 | r2 | All | All | All |
Operating System | Microsoft | Windows Server 2016 | - | All | All | All |
Operating System | Microsoft | Windows Server 2016 | - | All | All | All |
Operating System | Microsoft | Windows Vista | All | sp2 | All | All |
Operating System | Microsoft | Windows Vista | All | sp2 | All | All |
- cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE