Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.900059
Category:Windows : Microsoft Bulletins
Title:Vulnerabilities in GDI Could Allow Remote Code Execution (956802)
Summary:This host is missing a critical security update according to; Microsoft Bulletin MS08-071.
Description:Summary:
This host is missing a critical security update according to
Microsoft Bulletin MS08-071.

Vulnerability Insight:
The flaw is due to:

- an overflow error in GDI when processing headers in Windows Metafile (WMF)
files.

- an error in the way the GDI handles file size parameters in WMF files.

Vulnerability Impact:
Successful exploitation could allow execution of arbitrary code on the remote
system and cause heap based buffer overflow via a specially crafted WMF file.

Affected Software/OS:
Microsoft Windows 2K/XP/2003/Vista/2008 Server.

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-2249
Cert/CC Advisory: TA08-344A
http://www.us-cert.gov/cas/techalerts/TA08-344A.html
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=762
Microsoft Security Bulletin: MS08-071
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-071
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5984
http://www.securitytracker.com/id?1021365
http://www.vupen.com/english/advisories/2008/3383
Common Vulnerability Exposure (CVE) ID: CVE-2008-3465
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6062
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.