Files
CVEs-PoC/2018/CVE-2018-1012.md
T
2025-09-29 21:09:30 +02:00

52 lines
4.6 KiB
Markdown

### [CVE-2018-1012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1012)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Servers&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%208.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20RT%208.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20Service%20Pack%202%20(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Itanium-Based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Itanium-Based%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201511%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201511%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201607%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201607%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201703%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201703%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201709%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201709%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20RT%208.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=version%201709%20%20(Server%20Core%20Installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%201%20(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%202%20(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen)
### Description
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1010, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub