Help Center/ Host Security Service/ Best Practices/ Suggestions on How to Fix Official Disclosed Vulnerabilities Provided by HSS/ Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)
Updated on 2024-09-23 GMT+08:00

Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.

For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane.

Vulnerability ID

  • CVE-2020-1020
  • CVE-2020-0938

Vulnerability Name

Adobe Font Manager Library Remote Code Execution Vulnerability

Vulnerability Details

  • For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely.
  • For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Scope of Impact

All Windows OSs

Official Solution

It is recommended that affected users install the latest vulnerability patch as soon as possible.

For details, see https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2020-1020.

Suggestion

Perform the following steps to scan and fix a vulnerability.

  1. Scan and view details of a vulnerability. For details, see Viewing Details of a Vulnerability.

    Figure 1 Manually starting a vulnerability scan

  2. Fix and verify the vulnerability. For details about the operation procedure, see Fixing Vulnerabilities and Verifying the Result.