Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:MS-DW-MUL-RCE

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft DirectWrite Multiple Remote Code Execution

Release Date

2019/10/22

Update Number

3219

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Microsoft DirectWrite Multiple Remote Code Execution


This signature detects attempts to exploit a known vulnerability against Microsoft DirectWrite. A successful attack can lead to Remote Code Execution.

Extended Description

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1118, CVE-2019-1119, CVE-2019-1121, CVE-2019-1122, CVE-2019-1123, CVE-2019-1124, CVE-2019-1127, CVE-2019-1128.

Affected Products

  • Microsoft windows_10 1709
  • Microsoft windows_10 1803
  • Microsoft windows_10 1809
  • Microsoft windows_10 1903
  • Microsoft windows_server_2016 1803
  • Microsoft windows_server_2016 1903
  • Microsoft windows_server_2019 -

References

  • CVE: CVE-2019-1120
  • CVE: CVE-2019-1119
  • CVE: CVE-2019-1122
  • CVE: CVE-2019-1121
  • CVE: CVE-2019-1128
  • CVE: CVE-2019-1117
  • CVE: CVE-2019-1118
  • CVE: CVE-2019-1127
  • CVE: CVE-2019-1123
  • CVE: CVE-2019-1124
  • URL: https://packetstormsecurity.com/files/153588/GS20190711004117.tgz
  • URL: https://packetstormsecurity.com/files/153586/GS20190711003825.tgz
  • URL: https://packetstormsecurity.com/files/153584/GS20190711003607.tgz
  • URL: https://packetstormsecurity.com/files/153605/GS20190712113431.tgz
  • URL: https://packetstormsecurity.com/files/153602/GS20190712113245.tgz
  • URL: https://packetstormsecurity.com/files/153600/GS20190712112919.tgz
  • URL: https://packetstormsecurity.com/files/153573/GS20190710185637.tgz
  • URL: https://packetstormsecurity.com/files/153574/GS20190710185828.tgz
  • URL: https://packetstormsecurity.com/files/153575/GS20190710190015.tgz
  • URL: https://packetstormsecurity.com/files/153577/GS20190710190237.tgz
  • URL: https://packetstormsecurity.com/files/153578/GS20190710190410.tgz
  • URL: https://packetstormsecurity.com/files/153599/GS20190712112741.tgz
  • URL: https://packetstormsecurity.com/files/153601/GS20190712113101.tgz
  • URL: https://packetstormsecurity.com/files/153585/GS20190711003711.tgz
  • URL: https://packetstormsecurity.com/files/153582/GS20190711003032.tgz
  • URL: https://packetstormsecurity.com/files/153583/GS20190711003446.tgz
  • URL: https://packetstormsecurity.com/files/153592/GS20190711004619.tgz
  • URL: https://packetstormsecurity.com/files/153587/GS20190711003938.tgz

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out