Vulnerability Note VU#312956

Microsoft WMF memory corruption vulnerability

Original Release date: 09 Feb 2006 | Last revised: 14 Feb 2006

Overview

Microsoft applications fail to properly handle Windows Metafile (WMF) images potentially allowing a remote attacker to execute arbitrary code on a vulnerable system.

Description

The Microsoft Windows Graphics Rendering Engine supports a number of image formats including WMF images. Windows WMF processing routines do not properly handle WMF images. This may allow a remote attacker to manipulate memory management routines resulting in a buffer overflow. Note that WMF processing is used in many Windows programs including Internet Explorer and Outlook.

For more information, including a list of affected versions of Internet Explorer, please see Microsoft Security Advisory 913333 and Microsoft Security Bulletin MS06-004.

Impact

By persuading a user to open a specially crafted WMF image file, an attacker may be able to execute arbitrary code with the privileges of the user.

Solution

This issue is corrected in Internet Explorer 6 Service Pack 1. In addition, Microsoft Security Bulletin MS06-004 contains a cumulative update to correct this vulnerability.

Do not accept WMF files from untrusted sources


By only accessing WMF image files from trusted or known sources, the chances of exploitation are reduced.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected08 Feb 200614 Feb 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This issue was reported in Microsoft Security Advisory 913333.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-0020
  • Date Public: 09 Jan 2006
  • Date First Published: 09 Feb 2006
  • Date Last Updated: 14 Feb 2006
  • Severity Metric: 19.30
  • Document Revision: 27

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.