⚠ Actively exploited
Added to CISA KEV on 2022-03-03. Federal agencies required to patch by 2022-03-24. Required action: Apply updates per vendor instructions..

CVE-2015-2387Out-of-bounds Write in Microsoft Windows Server 2008

Severity
7.8HIGHNVD
EPSS
26.6%
top 3.65%
CISA KEV
KEV
Added 2022-03-03
Due 2022-03-24
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJul 14
KEV addedMar 3
KEV dueMar 24
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.

Description

ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability."

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-35f2-76rg-h8vq: ATMFD2022-05-14
Project0
A year of Windows kernel font fuzzing #1: the results - Project Zero2016-06-01
VulnCheck
Microsoft ATM Font Driver Privilege Escalation Vulnerability2015

📋Vendor Advisories

1
CISA
Microsoft ATM Font Driver Privilege Escalation Vulnerability2022-03-03

🕵️Threat Intelligence

8
Tenable
Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts2021-01-21
Qualys
Update2: Patch Tuesday July 2015 | Qualys2015-07-14
Talos
Microsoft Patch Tuesday – July 20152015-07-14
Talos
Microsoft Patch Tuesday – July 20152015-07-14
Qualys
Update2: Patch Tuesday July 2015 | Qualys2015-07-14

📄Research Papers

1
arXiv
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures2025-02-12