Check Point Reference: | SBP-2008-16 |
Date Published: | 9 Dec 2008 |
Severity: | Medium |
Last Updated: | Tuesday 01 January, 2008 |
Source: | Microsoft Security Bulletin MS08-071 |
Industry Reference: | CVE-2008-3465 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows 2000 SP4 Windows XP SP2 Windows XP SP3 Windows XP Professional x64 Edition Windows XP Professional x64 Edition SP2 Windows Server 2003 SP1 Windows Server 2003 SP2 Windows Server 2003 x64 Edition Windows Server 2003 x64 Edition SP2 Windows Server 2003 with SP1 (Itanium) Windows Server 2003 with SP2 (Itanium) Windows Vista Windows Vista SP1 Windows Vista x64 Edition Windows Vista x64 Edition SP1 Windows Server 2008 for 32-bit Systems Windows Server 2008 for x64-based Systems Windows Server 2008 for (Itanium) |
Vulnerability Description | A remote code execution vulnerability has been discovered in the way GDI handles file size parameters in WMF files. The Microsoft Windows graphics device interface (GDI) enables applications to use graphics and formatted text on the video display and on the printer. A remote attacker may trigger this issue via a specially crafted WMF image file. Windows Metafile (WMF) is a 16-bit metafile image format optimized for the Windows operating system that can contain both vector information and bitmap information. Successful exploitation would allow execution of arbitrary code on a vulnerable system. |
Update/Patch Avaliable | Apply patches: Microsoft Security Bulletin MS08-071 |
Vulnerability Details | The vulnerability is due to a heap overflow when GDI fails to properly process malformed file size parameters in specially crafted WMF image files. A remote attacker may trigger this issue by convincing a user to open a specially crafted WMF image file. By persuading a user to open the malformed WMF file, an attacker could take complete control of an affected system. |