search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Windows graphics engine thumbnail stack buffer overflow

Vulnerability Note VU#106516

Original Release Date: 2011-01-05 | Last Revised: 2011-02-08


Microsoft Windows contains a stack-based buffer overflow vulnerability in the graphics rendering engine, which may allow an attacker to execute arbitrary code.


Microsoft Windows contains a stack-based buffer overflow vulnerability caused by a signedness error in the "CreateSizedDIBSECTION()" function within the shimgvw.dll library when parsing thumbnail bitmaps containing a negative "biClrUsed" value.

Exploit code for this vulnerability is publicly available.


By convincing a user to view a specially crafted file containing a malicious thumbnail bitmap value, an attacker may be able to execute arbitrary code with the privileges of the user.


Apply an update

This issue is addressed in Microsoft Security Bulletin MS11-006.

Modify the Access Control List (ACL) on shimgvw.dll

Microsoft has published information on modifying the Access Control List (ACL) on shimgvw.dll as a mitigation for this vulnerability.

Vendor Information

Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability


Microsoft Corporation Affected

Updated:  February 08, 2011



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector



This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-3970
Severity Metric: 57.32
Date Public: 2011-01-04
Date First Published: 2011-01-05
Date Last Updated: 2011-02-08 18:22 UTC
Document Revision: 17

Sponsored by CISA.