search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Windows graphics engine thumbnail stack buffer overflow

Vulnerability Note VU#106516

Original Release Date: 2011-01-05 | Last Revised: 2011-02-08

Overview

Microsoft Windows contains a stack-based buffer overflow vulnerability in the graphics rendering engine, which may allow an attacker to execute arbitrary code.

Description

Microsoft Windows contains a stack-based buffer overflow vulnerability caused by a signedness error in the "CreateSizedDIBSECTION()" function within the shimgvw.dll library when parsing thumbnail bitmaps containing a negative "biClrUsed" value.

Exploit code for this vulnerability is publicly available.

Impact

By convincing a user to view a specially crafted file containing a malicious thumbnail bitmap value, an attacker may be able to execute arbitrary code with the privileges of the user.

Solution

Apply an update

This issue is addressed in Microsoft Security Bulletin MS11-006.

Modify the Access Control List (ACL) on shimgvw.dll

Microsoft has published information on modifying the Access Control List (ACL) on shimgvw.dll as a mitigation for this vulnerability.

Vendor Information

Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability

106516
 

Microsoft Corporation Affected

Updated:  February 08, 2011

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-3970
Severity Metric: 57.32
Date Public: 2011-01-04
Date First Published: 2011-01-05
Date Last Updated: 2011-02-08 18:22 UTC
Document Revision: 17

Sponsored by CISA.