Executive Summary

Summary
Title Vulnerability in GDI Could Allow Remote Code Execution (948590)
Informations
Name MS08-021 First vendor Publication 2008-04-08
Vendor Microsoft Last vendor Modification 2008-04-08
Severity (Vendor) Critical Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

This critical security update resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted EMF or WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5441
 
Oval ID: oval:org.mitre.oval:def:5441
Title: GDI Heap Overflow Vulnerability
Description: Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2008-1083
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:5580
 
Oval ID: oval:org.mitre.oval:def:5580
Title: GDI stack Overflow Vulnerability
Description: Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka "GDI Stack Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2008-1087
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 6
Os 2
Os 3
Os 3
Os 3

SAINT Exploits

Description Link
Windows GDI EMF filename buffer overflow More info here

ExploitDB Exploits

id Description
2008-10-02 MS Windows GDI (EMR_COLORMATCHTOTARGETW) Exploit MS08-021
2008-04-14 MS Windows GDI - Image Parsing Stack Overflow Exploit (MS08-021)

Open Source Vulnerability Database (OSVDB)

Id Description
44215 Microsoft Windows GDI EMF Filename Parameter Handling Overflow

A buffer overflow exists in Windows. GDI fails to validate EMF files resulting in a stack overflow. With a specially crafted file, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity.
44214 Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow

A buffer overflow exists in Windows. GDI fails to validate EMF and WMF image files resulting in a buffer overflow. With a specially crafted file, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity.
44213 Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows

A heap overflow overflow exists in Windows. gdi32.dll fails to validate EMF files resulting in a heap overflow. With a specially crafted file, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows GDI emf filename buffer overflow attempt
RuleID : 13676 - Revision : 10 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows GDI integer overflow attempt
RuleID : 13666 - Revision : 13 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2008-04-08 Name : Arbitrary code can be executed on the remote host by sending a malformed file...
File : smb_nt_ms08-021.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2020-12-12 21:23:44
  • Multiple Updates
2020-12-08 21:24:01
  • Multiple Updates
2020-12-05 21:23:47
  • Multiple Updates
2014-02-17 11:45:56
  • Multiple Updates
2014-01-19 21:30:11
  • Multiple Updates
2013-05-11 00:49:19
  • Multiple Updates