CVE-2004-0200
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/09/2004
Last modified:
03/04/2025
Description
Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:microsoft:.net_framework:1.0:sp2:sdk:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:digital_image_pro:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:digital_image_pro:9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:digital_image_suite:9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:frontpage:2002:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:frontpage:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:greetings:2002:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:infopath:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:onenote:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:outlook:2002:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=109524346729948&w=2
- http://www.kb.cert.org/vuls/id/297462
- http://www.us-cert.gov/cas/techalerts/TA04-260A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-028
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16304
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1105
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1721
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2706
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3038
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3082
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3320
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3810
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3881
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4003
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4216
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4307
- http://marc.info/?l=bugtraq&m=109524346729948&w=2
- http://www.kb.cert.org/vuls/id/297462
- http://www.us-cert.gov/cas/techalerts/TA04-260A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-028
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16304
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1105
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1721
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2706
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3038
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3082
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3320
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3810
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3881
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4003
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4216
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4307



