Vulnerability Note VU#923236

Microsoft Windows ART image handling buffer overflow

Original Release date: 13 Jun 2006 | Last revised: 14 Jun 2006

Overview

Microsoft Windows ART image handling routines are vulnerable to a heap-based buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

ART Images

According to Microsoft Security Bulletin MS06-022:

    ART is an image file format used by the America Online (AOL) client software. Windows also includes the library and Internet Explorer displays ART images.
The Problem

Microsoft Windows fails to properly handle malformed ART images allowing in a heap-based buffer overflow to occur. If a remote attacker can persuade a user to access specially crafted ART image, that attacker may be able to trigger the overflow.

Considerations

According to Microsoft Security Bulletin MS06-022:

For more information refer to Microsoft Security Bulletin MS06-022.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code. If the attacked user is running with administrative privileges, the attacker could take complete control of an affected system.

Solution

Apply a patch from Microsoft
Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-022.


For a list of workarounds refer to Microsoft Security Bulletin MS06-022.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-13 Jun 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by iDefense.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-2378
  • Date Public: 13 Jun 2006
  • Date First Published: 13 Jun 2006
  • Date Last Updated: 14 Jun 2006
  • Severity Metric: 55.58
  • Document Revision: 30

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.