Check Point Advisories

Preemptive Protection against Microsoft GDI+ PNG Integer Overflow Vulnerability (MS09-062)

Check Point Reference: CPAI-2009-232
Date Published: 13 Oct 2009
Severity: Critical
Last Updated: Friday 16 October, 2009
Source: Microsoft Security Bulletin MS09-062
Industry Reference:CVE-2009-3126
Protection Provided by:
Who is Vulnerable? Microsoft Internet Explorer 6 SP1 when installed on Microsoft Windows 2000 SP4
Windows XP SP2
Windows XP SP3
Windows XP Professional x64 Edition SP2
Microsoft Office XP SP3
Microsoft Office 2003 SP3
2007 Microsoft Office System SP1
2007 Microsoft Office System SP2
Microsoft Office Project 2002 SP1
Microsoft Visio 2002 SP2
Microsoft Office Word Viewer
Microsoft Word Viewer 2003
Microsoft Word Viewer 2003 SP3
Microsoft Office Excel Viewer 2003
Microsoft Office Excel Viewer 2003 SP3
Microsoft Office Excel Viewer
Microsoft Office PowerPoint Viewer 2007
Microsoft Office PowerPoint Viewer 2007 SP1
Microsoft Office PowerPoint Viewer 2007 SP2
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2
Microsoft Expression Web and Microsoft Expression Web 2
Microsoft Office Groove 2007
Microsoft Office Groove 2007 SP1
Microsoft Works 8.5
SQL Server 2000 Reporting Services SP2
SQL Server 2005 SP2
SQL Server 2005 x64 Edition SP2
SQL Server 2005 (Itanium)
SQL Server 2005 SP3
SQL Server 2005 x64 Edition SP3
SQL Server 2005 (Itanium) SP3
Microsoft Report Viewer 2005 SP1 Redistributable Package
Microsoft Report Viewer 2008 Redistributable Package
Microsoft Report Viewer 2008 Redistributable Package SP1
Microsoft Forefront Client Security 1.0 when installed on Microsoft Windows 2000 SP4
Vulnerability Description A remote code execution vulnerability has been discovered in the way that GDI+ allocates memory. The Microsoft Windows graphics device interface (GDI) enables applications to use graphics and formatted text on the video display and on the printer. A remote attacker may trigger this issue via a specially crafted PNG image file. The Portable Network Graphics (PNG) specification is an image format used as an alternative to other image formats such as the GIF and TIFF formats. Successful exploitation would allow execution of arbitrary code on a vulnerable system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS09-062
Vulnerability DetailsThe vulnerability is due to an error in GDI+ that incorrectly calculates the memory required for parsing a PNG. A remote attacker could trigger this flaw by convincing a victim to open a specially crafted PNG file. Successful exploitation of this issue may allow the attacker to take complete control of the affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK