Vulnerability Note VU#312956
Microsoft WMF memory corruption vulnerability
Microsoft applications fail to properly handle Windows Metafile (WMF) images potentially allowing a remote attacker to execute arbitrary code on a vulnerable system.
The Microsoft Windows Graphics Rendering Engine supports a number of image formats including WMF images. Windows WMF processing routines do not properly handle WMF images. This may allow a remote attacker to manipulate memory management routines resulting in a buffer overflow. Note that WMF processing is used in many Windows programs including Internet Explorer and Outlook.
By persuading a user to open a specially crafted WMF image file, an attacker may be able to execute arbitrary code with the privileges of the user.
Do not accept WMF files from untrusted sources
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||08 Feb 2006||14 Feb 2006|
CVSS Metrics (Learn More)
This issue was reported in Microsoft Security Advisory 913333.
This document was written by Jeff Gennari.
- CVE IDs: CVE-2006-0020
- Date Public: 09 Jan 2006
- Date First Published: 09 Feb 2006
- Date Last Updated: 14 Feb 2006
- Severity Metric: 19.30
- Document Revision: 27
If you have feedback, comments, or additional information about this vulnerability, please send us email.