SB2009101301 - Multiple vulnerabilities in Microsoft Windows



SB2009101301 - Multiple vulnerabilities in Microsoft Windows

Published: October 13, 2009 Updated: December 19, 2016

Security Bulletin ID SB2009101301
Severity
Critical
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 25% High 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Integer Overflow or Wraparound (CVE-ID: CVE-2009-2518)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow in GDI+ when handling malformed Office Documents. A remote attacker can create a Microsoft Office document containing a specially crafted BMP image, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

2) Memory corruption (CVE-ID: CVE-2009-2528)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow in GDI+ when parsing Office Art Property Tables. A remote attacker can create a specially crafted Microsoft Office file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

3) Memory corruption (CVE-ID: CVE-2009-2504)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow in APIs accessible from .NET Framework applications. A remote attacker can create a specially crafted ASP.NET or .NET Framework application, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

4) Memory corruption (CVE-ID: CVE-2009-2503)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in GDI+ when handling TIFF image file. A remote attacker can create a specially crafted TIFF image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

5) Buffer overflow (CVE-ID: CVE-2009-2502)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow in GDI+ when handling TIFF image file. A remote attacker can create a specially crafted TIFF image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

6) Heap-based buffer overflow (CVE-ID: CVE-2009-2501)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to heap-based buffer overflow in GDI+ when handling PNG image file. A remote attacker can create a specially crafted PNG image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

7) Integer Overflow or Wraparound (CVE-ID: CVE-2009-2500)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow when handling WMF image file. A remote attacker can create a specially crafted WMF image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

8) Integer Overflow or Wraparound (CVE-ID: CVE-2009-3126)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow in GDI+ when handling PNG image file. A remote attacker can create a specially crafted PNG image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: according to reports this vulnerability was being actively exploited before Microsoft issued security patch.

Remediation

Install update from vendor's website.