Vulnerability Note VU#646748

Embarcadero Delphi and C++Builder VCL BMP file processing buffer overflow

Original Release date: 11 Sep 2014 | Last revised: 12 Dec 2014

Overview

Embarcadero Delphi and C++ Builder Visual Component Library (VCL) bitmap (BMP) file processing code contains a buffer overflow that could allow an attacker to execute arbitrary code.

Description

Embarcadero Delphi and C++ Builder tools contain a buffer overflow (CWE-119) in VCL BMP file processing code (Vcl.Graphics.TPicture.Bitmap). Core Security Technologies advisory CORE-2014-0004 provides further details, including more specific information about vulnerable development tools. Any application built with a vulnerable VCL version are likely to also be vulnerable.

Impact

An attacker who can cause a vulnerable application to process a specially crafted BMP file could execute arbitrary code. Whether or not the attacker is remote or authenticated depends on the interfaces and behavior of the vulnerable application.

Solution

Update

Embarcadero has released a hotfix for XE6-series tools and provided documentation for older tools on how to modify VCL source code.

Rebuild applications

After updating using the hotfix or manually editing the VCL source code, rebuild applications using the updated VCL code.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Embarcadero TechnologiesAffected09 Jul 201411 Sep 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 6.8 E:POC/RL:ND/RC:C
Environmental 5.1 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Marcos Accossatto and Joaqu╠n Rodr╠guez Varela from Core Security Technologies and Mike Devery from Embarcadero.

This document was written by Art Manion.

Other Information

  • CVE IDs: CVE-2014-0993
  • Date Public: 20 Aug 2014
  • Date First Published: 11 Sep 2014
  • Date Last Updated: 12 Dec 2014
  • Document Revision: 27

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.