Overview
Microsoft Windows contains a stack-based buffer overflow vulnerability in the graphics rendering engine, which may allow an attacker to execute arbitrary code.
Description
Microsoft Windows contains a stack-based buffer overflow vulnerability caused by a signedness error in the "CreateSizedDIBSECTION()" function within the shimgvw.dll library when parsing thumbnail bitmaps containing a negative "biClrUsed" value. Exploit code for this vulnerability is publicly available. |
Impact
By convincing a user to view a specially crafted file containing a malicious thumbnail bitmap value, an attacker may be able to execute arbitrary code with the privileges of the user. |
Solution
Apply an update |
Modify the Access Control List (ACL) on shimgvw.dll |
Vendor Information
Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability |
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This document was written by Michael Orlando.
Other Information
| CVE IDs: | CVE-2010-3970 |
| Severity Metric: | 57.32 |
| Date Public: | 2011-01-04 |
| Date First Published: | 2011-01-05 |
| Date Last Updated: | 2011-02-08 18:22 UTC |
| Document Revision: | 17 |