Check Point Advisories

Microsoft Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow - Ver2 (CVE-2010-3970)

Check Point Reference: CPAI-2014-1930
Date Published: 28 Dec 2014
Severity: Critical
Last Updated: 12 Dec 2018
Source:
Industry Reference:CVE-2010-3970
Protection Provided by:

Security Gateway
R80, R77, R75

Who is Vulnerable?
Vulnerability Description Thumbnails are reduced-size versions of pictures, used to help in recognizing and organizing them, serving the same role for images as a normal text index does for words. A stack buffer overflow vulnerability has been discovered in Microsoft's Graphics Rendering Engine. The vulnerability is due to insufficient input validation by the Microsoft Graphics Rendering Engine when processing the biClrUsed of a bitmap thumbnail. A remote attacker may exploit this issue by enticing a user to handle a specially crafted file containing a malformed thumbnail. The file could be embedded in Office documents or a .MIC file. This vulnerability may be triggered by previewing the malicious file in thumbnail view. Successful exploitation of this vulnerability could lead to arbitrary code execution.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Microsoft Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow - Ver2 protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  IMAP Protocol Violation.
Attack Information:  Microsoft Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow - Ver2

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO