Check Point Advisories

Workaround for Microsoft GDI WMF Heap Overflow Vulnerability (MS08-071)

Check Point Reference: SBP-2008-16
Date Published: 9 Dec 2008
Severity: Medium
Last Updated: Tuesday 01 January, 2008
Source: Microsoft Security Bulletin MS08-071
Industry Reference:CVE-2008-3465
Protection Provided by:
Who is Vulnerable? Microsoft Windows 2000 SP4
Windows XP SP2
Windows XP SP3
Windows XP Professional x64 Edition
Windows XP Professional x64 Edition SP2
Windows Server 2003 SP1
Windows Server 2003 SP2
Windows Server 2003 x64 Edition
Windows Server 2003 x64 Edition SP2
Windows Server 2003 with SP1 (Itanium)
Windows Server 2003 with SP2 (Itanium)
Windows Vista
Windows Vista SP1
Windows Vista x64 Edition
Windows Vista x64 Edition SP1
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for x64-based Systems
Windows Server 2008 for (Itanium)
Vulnerability Description A remote code execution vulnerability has been discovered in the way GDI handles file size parameters in WMF files. The Microsoft Windows graphics device interface (GDI) enables applications to use graphics and formatted text on the video display and on the printer. A remote attacker may trigger this issue via a specially crafted WMF image file. Windows Metafile (WMF) is a 16-bit metafile image format optimized for the Windows operating system that can contain both vector information and bitmap information. Successful exploitation would allow execution of arbitrary code on a vulnerable system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS08-071
Vulnerability DetailsThe vulnerability is due to a heap overflow when GDI fails to properly process malformed file size parameters in specially crafted WMF image files. A remote attacker may trigger this issue by convincing a user to open a specially crafted WMF image file. By persuading a user to open the malformed WMF file, an attacker could take complete control of an affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK