HTTP: Microsoft Windows Graphics Rendering Engine EMF Parsing Memory Corruption

A remote code execution vulnerability exists in the way that GDI+ handles parsing of EMF image files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted EMF file image. Successful exploitation can result in memory corruption which may lead to arbitrary code execution under the credentials of the currently logged in user. In a successful attack case, the malicious code can be executed on the target host. The behaviour of the target depends upon the intention of the attacker. The code will be executed with the privileges of the logged in user. In case if the attack is not successful, the application using the affected library might be terminated due to memory corruption.

Extended Description

gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka "GDI+ EMF Memory Corruption Vulnerability."

Affected Products

Microsoft windows_vista

References

BugTraq: 31019

CVE: CVE-2008-3012

Short Name
HTTP:STC:DL:MS-EMF-PARSE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2008-3012 Corruption EMF Engine Graphics Memory Microsoft Parsing Rendering Windows bid:31019
Release Date
10/13/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.3

Found a potential security threat?