Description: Some vulnerabilities have been reported in various Microsoft products, which can be exploited by malicious people to compromise a vulnerable system.
1) An integer overflow exists when processing the number of colours used in a bitmap image. This can be exploited to cause a heap-based buffer overflow via a specially crafted bitmap image.
2) An integer overflow error in the handling of WMF image files can be exploited to cause a heap-based buffer overflow.
3) A boundary error in the processing of PNG files can be exploited to cause a heap-based buffer overflow.
4) A boundary error exists within the processing of the "BitsPerSample" tag in TIFF files. This can be exploited to cause a buffer overflow via a specially crafted TIFF file.
5) An error within the processing of malformed graphic control extensions in TIFF files can be exploited to corrupt memory.
6) An integer overflow error in certain GDI+ APIs can be exploited to cause a buffer overflow via a specially crafted .NET Framework application.
7) An integer overflow vulnerability in the processing of PNG files can be exploited to cause a buffer overflow.
8) An error exists in the parsing of msofbtOPT Office Drawing record types containing certain property IDs, which can be exploited to corrupt memory when a user opens a specially crafted Office document.
Successful exploitation of these vulnerabilities allows execution of arbitrary code.
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.
Ideas, suggestions, and other feedback are most welcome.