|Check Point Reference:||CPAI-2011-003|
|Date Published:||9 Jan 2011|
|Last Updated:||6 Mar 2016|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||Thumbnails are reduced-size versions of pictures, used to help in recognizing and organizing them, serving the same role for images as a normal text index does for words.A stack buffer overflow vulnerability has been discovered in Microsoft's Graphics Rendering Engine.The vulnerability is due to insufficient input validation by the Microsoft Graphics Rendering Engine when processing the biClrUsed of a bitmap thumbnail. A remote attacker may exploit this issue by enticing a user to handle a specially crafted file containing a malformed thumbnail. The file could be embedded in Office documents or a .MIC file. This vulnerability may be triggered by previewing the malicious file in thumbnail view. Successful exploitation of this vulnerability could lead to arbitrary code execution.|
This protection will detect and block the transferring of files containing malformed thumbnails over HTTP and CIFS.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update.For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Microsoft Graphics Rendering Engine thumbnail image stack buffer overflow