search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Windows graphics engine thumbnail stack buffer overflow

Vulnerability Note VU#106516

Original Release Date: 2011-01-05 | Last Revised: 2011-02-08


Microsoft Windows contains a stack-based buffer overflow vulnerability in the graphics rendering engine, which may allow an attacker to execute arbitrary code.


Microsoft Windows contains a stack-based buffer overflow vulnerability caused by a signedness error in the "CreateSizedDIBSECTION()" function within the shimgvw.dll library when parsing thumbnail bitmaps containing a negative "biClrUsed" value.

Exploit code for this vulnerability is publicly available.


By convincing a user to view a specially crafted file containing a malicious thumbnail bitmap value, an attacker may be able to execute arbitrary code with the privileges of the user.


Apply an update

This issue is addressed in Microsoft Security Bulletin MS11-006.

Modify the Access Control List (ACL) on shimgvw.dll

Microsoft has published information on modifying the Access Control List (ACL) on shimgvw.dll as a mitigation for this vulnerability.

Vendor Information

Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability

Affected   Unknown   Unaffected

Microsoft Corporation

Updated:  February 08, 2011



Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-3970
Severity Metric: 57.32
Date Public: 2011-01-04
Date First Published: 2011-01-05
Date Last Updated: 2011-02-08 18:22 UTC
Document Revision: 16

Sponsored by CISA.