|Check Point Reference:||CPAI-2014-1930|
|Date Published:||28 Dec 2014|
|Last Updated:||12 Dec 2018|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||Thumbnails are reduced-size versions of pictures, used to help in recognizing and organizing them, serving the same role for images as a normal text index does for words. A stack buffer overflow vulnerability has been discovered in Microsoft's Graphics Rendering Engine. The vulnerability is due to insufficient input validation by the Microsoft Graphics Rendering Engine when processing the biClrUsed of a bitmap thumbnail. A remote attacker may exploit this issue by enticing a user to handle a specially crafted file containing a malformed thumbnail. The file could be embedded in Office documents or a .MIC file. This vulnerability may be triggered by previewing the malicious file in thumbnail view. Successful exploitation of this vulnerability could lead to arbitrary code execution.|
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: IMAP Protocol Violation.
Attack Information: Microsoft Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow - Ver2