Vulnerability CVE-2004-0200


Published: 2004-09-28   Modified: 2012-02-12

Description:
Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.

Type:

CWE-Other

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Microsoft -> Visio 
Microsoft -> .net framework 
Microsoft -> Visual basic 
Microsoft -> Digital image pro 
Microsoft -> Visual c# 
Microsoft -> Digital image suite 
Microsoft -> Visual c++ 
Microsoft -> Excel 
Microsoft -> Visual j# .net 
Microsoft -> Frontpage 
Microsoft -> Visual studio .net 
Microsoft -> Greetings 
Microsoft -> WORD 
Microsoft -> Infopath 
Microsoft -> Windows 2003 server 
Microsoft -> Office 
Microsoft -> Windows xp 
Microsoft -> Onenote 
Microsoft -> Outlook 
Microsoft -> Picture it 
Microsoft -> Powerpoint 
Microsoft -> Producer 
Microsoft -> Project 
Microsoft -> Publisher 

 References:
http://marc.info/?l=bugtraq&m=109524346729948&w=2
http://www.kb.cert.org/vuls/id/297462
http://www.us-cert.gov/cas/techalerts/TA04-260A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-028
https://exchange.xforce.ibmcloud.com/vulnerabilities/16304
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1105
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1721
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2706
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3038
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3082
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3320
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3810
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3881
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4003
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4216
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4307

Copyright 2024, cxsecurity.com

 

Back to Top