CVE-2010-3970
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
22/12/2010
Last modified:
11/04/2025
Description
Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability."
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
- http://secunia.com/advisories/42779
- http://www.kb.cert.org/vuls/id/106516
- http://www.metasploit.com/redmine/projects/framework/repository/revisions/11466/entry/modules/exploits/windows/fileformat/ms11_xxx_createsizeddibsection.rb
- http://www.microsoft.com/technet/security/advisory/2490606.mspx
- http://www.powerofcommunity.net/speaker.html
- http://www.securityfocus.com/bid/45662
- http://www.securitytracker.com/id?1024932=
- http://www.vupen.com/english/advisories/2011/0018
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11671
- http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
- http://secunia.com/advisories/42779
- http://www.kb.cert.org/vuls/id/106516
- http://www.metasploit.com/redmine/projects/framework/repository/revisions/11466/entry/modules/exploits/windows/fileformat/ms11_xxx_createsizeddibsection.rb
- http://www.microsoft.com/technet/security/advisory/2490606.mspx
- http://www.powerofcommunity.net/speaker.html
- http://www.securityfocus.com/bid/45662
- http://www.securitytracker.com/id?1024932=
- http://www.vupen.com/english/advisories/2011/0018
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11671