CVE-2008-1087

Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka "GDI Stack Overflow Vulnerability."
References
Link Resource
http://marc.info/?l=bugtraq&m=120845064910729&w=2 Mailing List
http://marc.info/?l=bugtraq&m=120845064910729&w=2 Mailing List
http://secunia.com/advisories/29704 Vendor Advisory
http://www.osvdb.org/44215 Broken Link
http://www.securityfocus.com/bid/28570 Patch
http://www.securitytracker.com/id?1019798 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-099A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1145/references Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580
https://www.exploit-db.com/exploits/5442
https://www.exploit-db.com/exploits/6656
http://marc.info/?l=bugtraq&m=120845064910729&w=2 Mailing List
http://marc.info/?l=bugtraq&m=120845064910729&w=2 Mailing List
http://secunia.com/advisories/29704 Vendor Advisory
http://www.osvdb.org/44215 Broken Link
http://www.securityfocus.com/bid/28570 Patch
http://www.securitytracker.com/id?1019798 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-099A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1145/references Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580
https://www.exploit-db.com/exploits/5442
https://www.exploit-db.com/exploits/6656
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows-nt:2008:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows-nt:2008:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=120845064910729&w=2 - Mailing List () http://marc.info/?l=bugtraq&m=120845064910729&w=2 - Mailing List
References () http://secunia.com/advisories/29704 - Vendor Advisory () http://secunia.com/advisories/29704 - Vendor Advisory
References () http://www.osvdb.org/44215 - Broken Link () http://www.osvdb.org/44215 - Broken Link
References () http://www.securityfocus.com/bid/28570 - Patch () http://www.securityfocus.com/bid/28570 - Patch
References () http://www.securitytracker.com/id?1019798 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1019798 - Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA08-099A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-099A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2008/1145/references - Broken Link () http://www.vupen.com/english/advisories/2008/1145/references - Broken Link
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580 -
References () https://www.exploit-db.com/exploits/5442 - () https://www.exploit-db.com/exploits/5442 -
References () https://www.exploit-db.com/exploits/6656 - () https://www.exploit-db.com/exploits/6656 -

Information

Published : 2008-04-08 23:05

Updated : 2024-11-21 00:43


NVD link : CVE-2008-1087

Mitre link : CVE-2008-1087

CVE.ORG link : CVE-2008-1087


JSON object : View

Products Affected

microsoft

  • windows-nt
  • windows_vista
  • windows_2003_server
  • windows_xp
  • windows_2000
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer