SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (Microsoft)  >   Microsoft GDI+ Vendors:   Microsoft
Microsoft GDI+ Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code and Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1038002
SecurityTracker URL:  http://securitytracker.com/id/1038002
CVE Reference:   CVE-2017-0001, CVE-2017-0005, CVE-2017-0014, CVE-2017-0025, CVE-2017-0047, CVE-2017-0060, CVE-2017-0061, CVE-2017-0062, CVE-2017-0063, CVE-2017-0073, CVE-2017-0108   (Links to External Site)
Date:  Mar 14 2017
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 2008 R2 SP1, 7 SP1, 8.1, RT 8.1, 2012, 2012 R2, 10, 10 Version 1511, 10 Version 1607, 2016
Description:   Multiple vulnerabilities were reported in Microsoft GDI+. A local user can obtain elevated privileges on the target system. A remote user can execute arbitrary code on the target system. A remote user can obtain potentially sensitive information on the target system.

A local user can run a specially crafted application to trigger an object memory handling error in the Windows Graphics Device Interface (GDI) and execute arbitrary code on the target system with elevated privileges [CVE-2017-0001, CVE-2017-0005, CVE-2017-0025, CVE-2017-0047].
A local user can run a specially crafted application to trigger an object memory handling error in Windows GDI+ and obtain potentially sensitive information [CVE-2017-0060, CVE-2017-0062, CVE-2017-0073].

A local user can run a specially crafted application to trigger an object memory handling error in the Color Management Module (ICM32.dll) and bypass Address Space Layout Randomization (ASLR) on the system [CVE-2017-0061, CVE-2017-0063].

A remote user can create specially crafted content that, when loaded by the target user, will trigger an object memory handling error in the Windows Graphics Component and execute arbitrary code on the target system [CVE-2017-0014, CVE-2017-0108].

Hossein Lotfi, Secunia Research at Flexera Software, Lockheed Martin Computer Incident Response Team, Lokihart (via POC/PwnFest), Mateusz Jurczyk of Google Project Zero, Peter Hlavaty (@zer0mem), KeenLab, Tencent, Symeon Paraschoudis of SensePost, and bee13oy of CloverSec Labs (via Trend Micro's Zero Day Initiative (ZDI)) reported these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.

A remote user can execute arbitrary code on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor advisory.

The vendor advisory is available at:

https://technet.microsoft.com/library/security/ms17-013

Vendor URL:  technet.microsoft.com/library/security/ms17-013 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC