Vulnerability Note VU#632963
Microsoft GDI buffer overflow vulnerability
The Microsoft GDI contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.
The Graphics Device Interface (GDI) is component of the Microsoft Windows user interface. Windows Metafile (WMF) and Enhanced Metafile (EMF) are image file formats primarily used by the Windows operating system.
Per Microsoft Security Bulletin MS08-021:
What causes the vulnerability?
The vulnerability is caused by a buffer overflow when GDI improperly processes a malformed header in a specially crafted EMF or WMF image file.
There is a public report on the Symantec Security blog which indicates exploit code that targets this vulnerability is being actively developed.
By convincing a user to view a malicious image a remote, unauthenticated attacker may be able to execute arbitrary code. Note that Internet Explorer, in its default configuration, can automatically launch the Windows Picture and Fax Viewer as the result of viewing a web page and may be used as an attack vector.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||11 Apr 2008|
CVSS Metrics (Learn More)
Microsoft credits Jun Mao, Sebastian Apelt, Thomas Garnier, and Yamata Li for reporting this vulnerability.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2008-1083
- Date Public: 08 Apr 2008
- Date First Published: 11 Apr 2008
- Date Last Updated: 11 Apr 2008
- Severity Metric: 45.00
- Document Revision: 11
If you have feedback, comments, or additional information about this vulnerability, please send us email.