{"vuid":"VU#646748","idnumber":"646748","name":"Embarcadero Delphi and C++Builder VCL BMP file processing buffer overflow","keywords":[""],"overview":"Embarcadero Delphi and C++ Builder Visual Component Library (VCL) bitmap (BMP) file processing code contains a buffer overflow that could allow an attacker to execute arbitrary code.","clean_desc":"Embarcadero Delphi and C++ Builder tools contain a buffer overflow (CWE-119) in VCL BMP file processing code (Vcl.Graphics.TPicture.Bitmap). Core Security Technologies advisory CORE-2014-0004 provides further details, including more specific information about vulnerable development tools. Any application built with a vulnerable VCL version are likely to also be vulnerable.","impact":"An attacker who can cause a vulnerable application to process a specially crafted BMP file could execute arbitrary code. Whether or not the attacker is remote or authenticated depends on the interfaces and behavior of the vulnerable application.","resolution":"Update \nEmbarcadero has released a hotfix for XE6-series tools and provided documentation for older tools on how to modify VCL source code. Rebuild applications After updating using the hotfix or manually editing the VCL source code, rebuild applications using the updated VCL code.","workarounds":"","sysaffected":"","thanks":"Thanks to Marcos Accossatto and JoaquÌn RodrÌguez Varela from Core Security Technologies and Mike Devery from Embarcadero.","author":"This document was written by Art Manion.","public":["http://www.coresecurity.com/advisories/delphi-and-c-builder-vcl-library-buffer-overflow","http://docwiki.embarcadero.com/Libraries/XE6/en/Vcl.Graphics.TPicture.Bitmap","http://qc.embarcadero.com/wc/qcmain.aspx?d=126004","http://support.embarcadero.com/article/44015","http://cwe.mitre.org/data/definitions/119.html"],"cveids":["CVE-2014-0993"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-06-13T19:14:36Z","publicdate":"2014-08-20T00:00:00Z","datefirstpublished":"2014-09-11T17:35:56Z","dateupdated":"2014-12-12T16:24:05Z","revision":28,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.8","cvss_environmentalscore":"5.05214488760625","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}