Secunia Logo  


Secunia PSI WorldMap
 
Microsoft Products GDI+ Multiple Vulnerabilities
Secunia Advisory: SA37007
Release Date: 2009-10-14
Last Update: 2009-10-29
Popularity: 9,601 views

Critical:
Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

OS:Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2008
Microsoft Windows Storage Server 2003
Microsoft Windows Vista
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Software:Microsoft .NET Framework 1.x
Microsoft .NET Framework 2.x
Microsoft Expression Web 1.x
Microsoft Expression Web 2.x
Microsoft Forefront Client Security 1.x
Microsoft Internet Explorer 6.x
Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office 2007
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
Microsoft Office Excel Viewer 2003
Microsoft Office Groove 2007
Microsoft Office PowerPoint Viewer 2007
Microsoft Office Word Viewer
Microsoft Office Word Viewer 2003
Microsoft Office XP
Microsoft Platform SDK Redistributable: GDI+
Microsoft Project 2002
Microsoft Report Viewer 2005
Microsoft Report Viewer 2008
Microsoft SQL Server 2005
Microsoft SQL Server 2005 Compact Edition 3.x
Microsoft SQL Server 2005 Express Edition
Microsoft Visio 2002
Microsoft Visio 2007 Viewer
Microsoft Visual FoxPro 8.x
Microsoft Visual FoxPro 9.x
Microsoft Visual Studio .NET 2003
Microsoft Visual Studio 2005
Microsoft Visual Studio 2008
Microsoft Works 8.x
SQL Server 2000 Reporting Services

Binary Analysis: BA876 :: Available for 1 Credit
BA871 :: Available for 1 Credit
BA546 :: Available for 1 Credit
BA877 :: Available for 1 Credit
BA879 :: Available for 1 Credit
BA880 :: Available for 1 Credit

Secunia CVSS-2 Score: Available in Secunia business solutions

Subscribe: Instant alerts on relevant vulnerabilities


Advisory Content (Page 1 of 3)[ 1 ] [ 2 ] [ 3 ]

Description:
Some vulnerabilities have been reported in various Microsoft products, which can be exploited by malicious people to compromise a vulnerable system.

1) An integer overflow exists when processing the number of colours used in a bitmap image. This can be exploited to cause a heap-based buffer overflow via a specially crafted bitmap image.

2) An integer overflow error in the handling of WMF image files can be exploited to cause a heap-based buffer overflow.

3) A boundary error in the processing of PNG files can be exploited to cause a heap-based buffer overflow.

4) A boundary error exists within the processing of the "BitsPerSample" tag in TIFF files. This can be exploited to cause a buffer overflow via a specially crafted TIFF file.

5) An error within the processing of malformed graphic control extensions in TIFF files can be exploited to corrupt memory.

6) An integer overflow error in certain GDI+ APIs can be exploited to cause a buffer overflow via a specially crafted .NET Framework application.

7) An integer overflow vulnerability in the processing of PNG files can be exploited to cause a buffer overflow.

8) An error exists in the parsing of msofbtOPT Office Drawing record types containing certain property IDs, which can be exploited to corrupt memory when a user opens a specially crafted Office document.

Successful exploitation of these vulnerabilities allows execution of arbitrary code.

Change Page:
[ 1 ] [ 2 ] [ 3 ]



Track this Secunia Advisory
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.

Read more about our Vulnerability Intelligence solutions and what they can do for you and your company.

About this Secunia Advisory
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
  
Latest Advisories

Send Feedback to Secunia
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.

Most Popular - 3 Hours

1. Adobe Flash Player Multiple Vulnerabilities // 197 views
2. Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability // 56 views
3. Sun Java JDK / JRE Multiple Vulnerabilities // 31 views
4. Internet Explorer Multiple Vulnerabilities // 29 views
5. Adobe Reader/Acrobat Multiple Vulnerabilities // 26 views
6. Microsoft Products GDI+ Multiple Vulnerabilities // 23 views
7. Kaspersky Anti-Virus 2010 klavemu.kdl Denial of Service Vulnerability // 17 views
8. Adobe Flash Player Multiple Vulnerabilities // 14 views
9. Microsoft Windows Indeo Codec Multiple Vulnerabilities // 14 views
10. Apple QuickTime Multiple Vulnerabilities // 12 views