{"vuid":"VU#300549","idnumber":"300549","name":"Microsoft Windows Graphics Rendering Engine buffer overflow vulnerability","keywords":["Microsoft","Windows","remote code execution","buffer overflow","BoF","WMF","EMF","MS05-053"],"overview":"Microsoft Windows Graphics Rendering Engine contains a buffer overflow that may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"The Microsoft Windows Graphics Rendering Engine supports a number of image formats including Windows Metafile (WMF) and Enhanced Metafile (EMF). The Windows Graphics Rendering Engine fails to properly validate WMF and EMF image files. This may allow a remote attacker to manipulate memory allocation routines to create an under-sized buffer. When data is copied to this buffer, a heap-based buffer overflow may occur. Note that according to public reports, this vulnerability may also affect the Graphical Device Interface (GDI) subsystem.","impact":"By persuading a user to open a specially crafted WMF or EMF image file, an attacker may be able to execute arbitrary code with the privileges of the user.","resolution":"Apply an update \nMicrosoft has addressed this issue in Microsoft Security Bulletin MS05-053.","workarounds":"Do not accept WMF or EMF files from untrusted sources By only accessing WMF or EMF image files from trusted or known sources, the chances of exploitation are reduced. For additional workarounds and mitigating factors for this vulnerability, please see MS05-053.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS05-053 Microsoft credits eEye Digital Security and Symantec Security Response for","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/Bulletin/MS05-053.mspx","http://www.eeye.com/html/research/advisories/AD20051108a.html"],"cveids":["CVE-2005-2123"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-08T18:56:24Z","publicdate":"2005-11-08T00:00:00Z","datefirstpublished":"2005-11-08T20:28:59Z","dateupdated":"2006-02-08T19:38:02Z","revision":15,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"20","cam_impact":"18","cam_easeofexploitation":"11","cam_attackeraccessrequired":"10","cam_scorecurrent":"13.365","cam_scorecurrentwidelyknown":"17.0775","cam_scorecurrentwidelyknownexploited":"31.9275","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.365,"vulnote":null}