Microsoft GDI+ Processing Flaws Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1030376 |
SecurityTracker URL: http://securitytracker.com/id/1030376
|
CVE Reference:
CVE-2014-1817, CVE-2014-1818
(Links to External Site)
|
Date: Jun 10 2014
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
Two vulnerabilities were reported in Microsoft GDI+. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create a specially crafted font file that, when loaded by the target user, will trigger a memory corruption flaw in the Unicode Script Processor (usp10.dll) and execute arbitrary code on the target user's system [CVE-2014-1817].
Scott Bell of Security-Assessment.com reported this vulnerability.
A remote user can create an image file with specially crafted image record types that, when loaded by the target user, will trigger a memory corruption flaw and execute arbitrary code on the target user's system [CVE-2014-1818].
Mateusz "j00ru" Jurczyk of Google Inc reported this vulnerability.
|
Impact:
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
The vendor has issued a fix.
A patch matrix is available in the vendor's advisory.
A restart is required.
The Microsoft advisory is available at:
https://technet.microsoft.com/library/security/ms14-036
|
Vendor URL: technet.microsoft.com/library/security/ms14-036 (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|