Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2436 |
Message | WEB-CLIENT Microsoft wmf metafile access |
Summary | This event is generated when an attempt is made to access a file type that may be subject to a known vulnerability in Microsoft Windows Explorer. |
Impact | Denial of Service (DoS) possible execution of arbitrary code. |
Detailed Information | When processing Windows Extended Metafile Format (.emf) files, Windows Explorer sets a buffer size based on information in the header for the file. If a malformed header is sent, it may be possible for an attacker to cause a DoS condition to occur. It may also be possible for an attacker to execute code of their choosing on a vulnerable host. This issue may also affect Microsoft Windows Metafile Format (.wmf) files also. |
Affected Systems | Microsoft Windows XP Home, Professional and Media Center Edition Microsoft Windows XP Home and Professional SP-1 |
Attack Scenarios | An attacker might supply a specially crafted request for such a file that might cause the error condiion to occur. |
Ease of Attack | Moderate/Difficult |
Corrective Action | Apply the appropriate vendor supplied patches |
Additional References | |
Rule References | bugtraq: 10120 bugtraq: 9707 cve: 2003-0906 url: www.microsoft.com/technet/security/bulletin/MS04-011.mspx |
--
DID:367189
--
http://www.aanval.com/