{"vuid":"VU#806278","idnumber":"806278","name":"Microsoft Windows contains buffer overflow in processing of WMF and EMF image files","keywords":["Microsoft","Windows","Graphics Rendering Engine","Windows Metafile","WMF","Enhanced Metafile","EMF","MS04-032","840987"],"overview":"A vulnerability in the way the Microsoft Windows Graphics Rendering Engine processes certain types of image files could allow an attacker to execute arbitrary code on a vulnerable system.","clean_desc":"The Microsoft Windows Graphics Rendering Engine supports a number of image formats including Windows Metafile (WMF) and Enhanced Metafile (EMF). There is a vulnerability in the way a buffer is validated by the Graphics Rendering Engine when processing these image formats. Exploitation of this vulnerability could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Microsoft reports that this vulnerability is different than the GDI+ vulnerability described in MS04-028 and that the vulnerable component is not redistributed with other applications. The affected component in the GDI+ vulnerability could be redistributed by other applications.","impact":"A remote attacker may be able to cause a denial of service or potentially execute arbitrary code on a vulnerable system by introducing a specially crafted WMF or EMF file. This malicious WMF or EMF image may be introduced to the system via a malicious web page, HTML email, or an email attachment.","resolution":"Apply Patch\nMicrosoft has provided a patch to address this vulnerability. For a list of affected versions and details on obtaining the patch, please refer to Microsoft Security Bulletin MS04-032.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Microsoft. Microsoft credits \nPatrick Porlan\n and Mark Russinovich of \nWinternals Software\n for discovering this vulnerability.","author":"This document was written by Damon Morda and based on information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/MS04-032.mspx","http://support.microsoft.com/default.aspx?scid=kb;en-us;320314","http://securitytracker.com/alerts/2004/Oct/1011645.html","http://secunia.com/advisories/12804/"],"cveids":["CVE-2004-0209"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-10-12T19:54:15Z","publicdate":"2004-10-12T00:00:00Z","datefirstpublished":"2004-10-13T16:56:14Z","dateupdated":"2004-10-13T17:01:27Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"25.3125","cam_scorecurrentwidelyknown":"29.53125","cam_scorecurrentwidelyknownexploited":"46.40625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":25.3125,"vulnote":null}