CVE DATABASE / CVE-2011-3402
CVE-2011-3402
Microsoft Windows Remote Code Execution Vulnerability
Confirmed exploited in the wild. Added 2025-10-06.
Federal remediation due 2025-10-27.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Summary
Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability."
CVSS 3.1 breakdown
| Base score | 8.8 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | HIGH |
| Availability | HIGH |
Affected products
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://blogs.mcafee.com/mcafee-labs/the-day-of-the-golden-jackal-%E2%80%93-further-tales-of-the-stuxnet-files
- http://blogs.technet.com/b/msrc/archive/2011/11/03/microsoft-releases-security-advisory-2639658.aspx
- http://isc.sans.edu/diary/Duqu+Mitigation/11950
- http://secunia.com/advisories/49121
- http://secunia.com/advisories/49122
- http://technet.microsoft.com/security/advisory/2639658
- http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two
- http://www.securitytracker.com/id?1027039
- http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit
- http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf
- http://www.us-cert.gov/cas/techalerts/TA11-347A.html
- http://www.us-cert.gov/cas/techalerts/TA12-129A.html
- http://www.us-cert.gov/cas/techalerts/TA12-164A.html
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-291-01E.pdf
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087
Data: NIST NVD + CISA KEV. NVD last modified 2026-04-22. Always verify against the vendor advisory before acting.