HTTP: Microsoft Windows Color Management Module Buffer Overflow
This signature detects a known vulnerability in Microsoft Windows Color Management Module. An attacker can create a Web site containing Web pages with dangerous image files, which if accessed by a victim, allows the attacker to gain control of the victim's computer.
Extended Description
Microsoft Windows is prone to a buffer-overflow vulnerability in the Color Management Module. The issue is due to a boundary-condition error related to the parsing of ICC (International Color Consortium) Profile tags in various supported image and document formats. ICC Profile data may possibly be embedded in various file formats, including JPEG, GIF, EXIF, TIFF, PNG, PICT, PDF, PostScript, SVG, JDF, and CSS3. Some of these formats may not provide an attack vector, especially if Microsoft doesn't provide native support or doesn't call the vulnerable functionality when handling certain formats. Successful exploitation may result in the execution of arbitrary code in the context of the currently logged-in user. An attacker could exploit this vulnerability by posting a malicious document on a website, by sending malicious content via email, or through other means. There is also a risk that other Microsoft or third-party applications that rely on the affected functionality may be vulnerable. Since a number of third-party applications may ship with vulnerable libraries, they may remain vulnerable despite having applied the Microsoft patch. Symantec is not aware of any such vendors at the time of writing.
Affected Products
Microsoft windows_xp_media_center_edition
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Microsoft
7.5