Lucene search

K
certCERTVU:300549
HistoryNov 08, 2005 - 12:00 a.m.

Microsoft Windows Graphics Rendering Engine buffer overflow vulnerability

2005-11-0800:00:00
www.kb.cert.org
19

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.397 Low

EPSS

Percentile

97.3%

Overview

Microsoft Windows Graphics Rendering Engine contains a buffer overflow that may allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

The Microsoft Windows Graphics Rendering Engine supports a number of image formats including Windows Metafile (WMF) and Enhanced Metafile (EMF). The Windows Graphics Rendering Engine fails to properly validate WMF and EMF image files. This may allow a remote attacker to manipulate memory allocation routines to create an under-sized buffer. When data is copied to this buffer, a heap-based buffer overflow may occur.

Note that according to public reports, this vulnerability may also affect the Graphical Device Interface (GDI) subsystem.


Impact

By persuading a user to open a specially crafted WMF or EMF image file, an attacker may be able to execute arbitrary code with the privileges of the user.


Solution

Apply an update

Microsoft has addressed this issue in Microsoft Security Bulletin MS05-053.


Do not accept WMF or EMF files from untrusted sources

By only accessing WMF or EMF image files from trusted or known sources, the chances of exploitation are reduced.

For additional workarounds and mitigating factors for this vulnerability, please see MS05-053.


Vendor Information

300549

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: November 08, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://www.microsoft.com/technet/security/Bulletin/MS05-053.mspx&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23300549 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin MS05-053. Microsoft credits eEye Digital Security and Symantec Security Response for

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-2123
Severity Metric: 13.37 Date Public:

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.397 Low

EPSS

Percentile

97.3%