|
|||
Rule General Information |
---|
Release Date: | 2021-03-15 | |
Rule Name: | Microsoft Windows Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow Vulnerability (CVE-2010-3970) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability." | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | MicrosoftSecurityBulletin:2490606 SecurityFocusBID:45662 MicrosoftSecurityBulletin:ms11-006 http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://technet.microsoft.com/en-us/security/bulletin/ms11-006 |