CVE-2008-1083
08.04.2008, 23:05
Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability."Enginsight
Vendor | Product | Version |
---|---|---|
microsoft | windows_2000 | * |
microsoft | windows_2003_server | * |
microsoft | windows_2003_server | * |
microsoft | windows_2003_server | * |
microsoft | windows_2003_server | * |
microsoft | windows_2003_server | * |
microsoft | windows_2003_server | * |
microsoft | windows_server_2008 | - |
microsoft | windows_server_2008 | - |
microsoft | windows_vista | * |
microsoft | windows_vista | * |
microsoft | windows_vista | - |
microsoft | windows_xp | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
- CWE-190 - Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
References