Check Point Reference: | CPAI-2009-232 |
Date Published: | 13 Oct 2009 |
Severity: | Critical |
Last Updated: | Friday 16 October, 2009 |
Source: | Microsoft Security Bulletin MS09-062 |
Industry Reference: | CVE-2009-3126 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Internet Explorer 6 SP1 when installed on Microsoft Windows 2000 SP4 Windows XP SP2 Windows XP SP3 Windows XP Professional x64 Edition SP2 Microsoft Office XP SP3 Microsoft Office 2003 SP3 2007 Microsoft Office System SP1 2007 Microsoft Office System SP2 Microsoft Office Project 2002 SP1 Microsoft Visio 2002 SP2 Microsoft Office Word Viewer Microsoft Word Viewer 2003 Microsoft Word Viewer 2003 SP3 Microsoft Office Excel Viewer 2003 Microsoft Office Excel Viewer 2003 SP3 Microsoft Office Excel Viewer Microsoft Office PowerPoint Viewer 2007 Microsoft Office PowerPoint Viewer 2007 SP1 Microsoft Office PowerPoint Viewer 2007 SP2 Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 Microsoft Expression Web and Microsoft Expression Web 2 Microsoft Office Groove 2007 Microsoft Office Groove 2007 SP1 Microsoft Works 8.5 SQL Server 2000 Reporting Services SP2 SQL Server 2005 SP2 SQL Server 2005 x64 Edition SP2 SQL Server 2005 (Itanium) SQL Server 2005 SP3 SQL Server 2005 x64 Edition SP3 SQL Server 2005 (Itanium) SP3 Microsoft Report Viewer 2005 SP1 Redistributable Package Microsoft Report Viewer 2008 Redistributable Package Microsoft Report Viewer 2008 Redistributable Package SP1 Microsoft Forefront Client Security 1.0 when installed on Microsoft Windows 2000 SP4 |
Vulnerability Description | A remote code execution vulnerability has been discovered in the way that GDI+ allocates memory. The Microsoft Windows graphics device interface (GDI) enables applications to use graphics and formatted text on the video display and on the printer. A remote attacker may trigger this issue via a specially crafted PNG image file. The Portable Network Graphics (PNG) specification is an image format used as an alternative to other image formats such as the GIF and TIFF formats. Successful exploitation would allow execution of arbitrary code on a vulnerable system. |
Update/Patch Avaliable | Apply patches: Microsoft Security Bulletin MS09-062 |
Vulnerability Details | The vulnerability is due to an error in GDI+ that incorrectly calculates the memory required for parsing a PNG. A remote attacker could trigger this flaw by convincing a victim to open a specially crafted PNG file. Successful exploitation of this issue may allow the attacker to take complete control of the affected system. |