← Zuruck zu CVEs
CVE-2010-3970
N/ABeschreibung
Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability."
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht12/22/2010
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
microsoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_vistamicrosoft:windows_xp
Schwachen (CWE)
CWE-119
Referenzen
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx(secure@microsoft.com)
http://secunia.com/advisories/42779(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/106516(secure@microsoft.com)
http://www.metasploit.com/redmine/projects/framework/repository/revisions/11466/entry/modules/exploits/windows/fileformat/ms11_xxx_createsizeddibsection.rb(secure@microsoft.com)
http://www.microsoft.com/technet/security/advisory/2490606.mspx(secure@microsoft.com)
http://www.powerofcommunity.net/speaker.html(secure@microsoft.com)
http://www.securityfocus.com/bid/45662(secure@microsoft.com)
http://www.securitytracker.com/id?1024932(secure@microsoft.com)
http://www.vupen.com/english/advisories/2011/0018(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11671(secure@microsoft.com)
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42779(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/106516(af854a3a-2127-422b-91ae-364da2661108)
http://www.metasploit.com/redmine/projects/framework/repository/revisions/11466/entry/modules/exploits/windows/fileformat/ms11_xxx_createsizeddibsection.rb(af854a3a-2127-422b-91ae-364da2661108)
http://www.microsoft.com/technet/security/advisory/2490606.mspx(af854a3a-2127-422b-91ae-364da2661108)
http://www.powerofcommunity.net/speaker.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/45662(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1024932(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0018(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11671(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.