{"vuid":"VU#909508","idnumber":"909508","name":"Microsoft Graphics Rendering Engine fails to properly handle WMF images","keywords":["Microsoft","Graphics Rendering Engine","WMF","Windows Metafile","remote code execution","ms06-june","MS06-026"],"overview":"Microsoft Windows Graphics Rendering Engine contains a vulnerability that may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"The Microsoft Windows Graphics Rendering Engine supports a number of image formats including Windows Metafile (WMF). An unspecified vulnerability exists in the way that the Graphics Rendering Engine included with some versions of Microsoft Windows handles WMF image files.","impact":"By persuading a user to open a specially crafted WMF image file, an attacker may be able to execute arbitrary code on an affected system. This specially crafted WMF image file could be supplied on a web page, in an email message, or by other means.","resolution":"Apply a patch Microsoft has published patches for this issue in Microsoft Security Bulletin MS06-026.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft for reporting this vulnerability. Microsoft, in turn, credits \nPeter Ferrie of \nSymantec\n with reporting this issue to them.","author":"This document was written by Chad R Dougherty.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","6","-","0","2","6",".","m","s","p","x"],"cveids":["CVE-2006-2376"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-13T18:33:56Z","publicdate":"2006-06-13T00:00:00Z","datefirstpublished":"2006-06-13T20:01:58Z","dateupdated":"2006-06-13T20:25:15Z","revision":7,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"22.5","cam_scorecurrentwidelyknown":"27","cam_scorecurrentwidelyknownexploited":"45","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":22.5,"vulnote":null}