Threat Encyclopedia

MS.GDI+.EMFPlusPoint.Integer.Overflow

description-logoDescription

At April 12, 2011, Microsoft release a Security Bulletin MS11-029 regarding a privately reported vulnerability in Microsoft Windows GDI+. The vulnerability could allow remote code execution if a user viewed a specially crafted image file using affected software or visited a Web site that contains specially crafted content. Users who operate with administrative user rights on the system could be more impacted than users whose accounts are configured to have fewer user rights.
Nicolas Joly and Chaouki Bekrar of VUPEN Threat Protection Program reported the GDI+ Integer Overflow Vulnerability: A remote code execution vulnerability exists in the way that GDI+ handles integer calculations. The vulnerability could allow remote code execution if a user opens a specially crafted EMF image file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs, view/change/delete data, or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.(CVE-2011-0041)
This security update is rated Critical for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008; and Important for Microsoft Office XP Service Pack 3.

affected-products-logoAffected Products

Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2***
Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2***
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
Microsoft Office XP Service Pack 3

Impact

The vulnerability could allow remote code execution if a user viewed a specially crafted image file using affected software or visited a Web page that contains specially crafted content. Users who operate with administrative user rights on the system could be more impacted than users whose accounts are configured to have fewer user rights.

recomended-action-logoRecommended Actions

The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871 (http://support.microsoft.com/kb/294871). />For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update (http://go.microsoft.com/fwlink/?LinkID=40747) service.
For FortiGate users, turning on these IPS signatures can prevent exploitation of this vulnerability:
MS.GDIPlus.EMFPlusPoint.Integer.Overflow

CVE References

CVE-2011-0041