TUCoPS :: Windows :: va1226.htm

Windows GDI+ GIF memory corruption
Windows GDI+ GIF memory corruption
Windows GDI+ GIF memory corruption



There is a memory corruption vulnerability with GIF file processing in
Microsoft GDI+ that can be used to crash a vulnerable application and
potentially execute arbitrary code.

###################
#The vulnerability#
###################

The vulnerability is caused due to improper handling of graphic
control extension when processing malformed GIF files. The
vulnerability can be triggered if a large number of extension markers
(0x21) followed by unknown labels is found when processing a GIF file.

########
#Impact#
########

This vulnerability can be used to corrupt memory of any application
utilizing GDI+ for GIF file decoding if it is used to open a malformed
GIF file. This could lead to code execution with the privileges of the
user running the vulnerable application.

############
#References#
############

http://ifsec.blogspot.com/2008/09/windows-gdi-gif-memory-corruption.html 
http://www.zerodayinitiative.com/advisories/ZDI-08-056/ 
http://www.microsoft.com/technet/security/bulletin/ms08-052.mspx 
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3013 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH