← Voltar para CVEs
CVE-2010-3970
N/ADescricao
Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability."
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado12/22/2010
Ultima modificacao4/29/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
microsoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_vistamicrosoft:windows_xp
Fraquezas (CWE)
CWE-119
Referencias
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx(secure@microsoft.com)
http://secunia.com/advisories/42779(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/106516(secure@microsoft.com)
http://www.metasploit.com/redmine/projects/framework/repository/revisions/11466/entry/modules/exploits/windows/fileformat/ms11_xxx_createsizeddibsection.rb(secure@microsoft.com)
http://www.microsoft.com/technet/security/advisory/2490606.mspx(secure@microsoft.com)
http://www.powerofcommunity.net/speaker.html(secure@microsoft.com)
http://www.securityfocus.com/bid/45662(secure@microsoft.com)
http://www.securitytracker.com/id?1024932(secure@microsoft.com)
http://www.vupen.com/english/advisories/2011/0018(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11671(secure@microsoft.com)
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42779(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/106516(af854a3a-2127-422b-91ae-364da2661108)
http://www.metasploit.com/redmine/projects/framework/repository/revisions/11466/entry/modules/exploits/windows/fileformat/ms11_xxx_createsizeddibsection.rb(af854a3a-2127-422b-91ae-364da2661108)
http://www.microsoft.com/technet/security/advisory/2490606.mspx(af854a3a-2127-422b-91ae-364da2661108)
http://www.powerofcommunity.net/speaker.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/45662(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1024932(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0018(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11671(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.