Vulnerability Note VU#923236

Microsoft Windows ART image handling buffer overflow

Original Release date: 13 Jun 2006 | Last revised: 14 Jun 2006


Microsoft Windows ART image handling routines are vulnerable to a heap-based buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.


ART Images

According to Microsoft Security Bulletin MS06-022:

ART is an image file format used by the America Online (AOL) client software. Windows also includes the library and Internet Explorer displays ART images.
The Problem

Microsoft Windows fails to properly handle malformed ART images allowing in a heap-based buffer overflow to occur. If a remote attacker can persuade a user to access specially crafted ART image, that attacker may be able to trigger the overflow.


According to Microsoft Security Bulletin MS06-022:

Windows 2000 does not support AOL ART images by default. Windows 2000 is only affected if the Windows 2000 AOL Image Support Update has been installed.

For more information refer to Microsoft Security Bulletin MS06-022.


A remote, unauthenticated attacker may be able to execute arbitrary code. If the attacked user is running with administrative privileges, the attacker could take complete control of an affected system.


Apply a patch from Microsoft
Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-022.

For a list of workarounds refer to Microsoft Security Bulletin MS06-022.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-13 Jun 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by iDefense .

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-2378
  • Date Public: 13 Jun 2006
  • Date First Published: 13 Jun 2006
  • Date Last Updated: 14 Jun 2006
  • Severity Metric: 55.58
  • Document Revision: 30


If you have feedback, comments, or additional information about this vulnerability, please send us email.