MS11-006: Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185)

high Nessus Plugin ID 51906

Synopsis

It may be possible to execute arbitrary code on the remote host using the graphics rendering engine.

Description

If a remote attacker can trick a user on the affected host into opening a specially crafted bitmap file, a vulnerability in the graphics rendering engine that arises due to its failure to validate the 'biClrUsed' parameter could be leveraged to execute arbitrary code on the host subject to the user's privileges.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008.

See Also

https://www.nessus.org/u?1ac9f3e1

Plugin Details

Severity: High

ID: 51906

File Name: smb_nt_ms11-006.nasl

Version: 1.24

Type: local

Agent: windows

Published: 2/8/2011

Updated: 8/5/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2010-3970

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/8/2011

Vulnerability Publication Date: 12/15/2010

Exploitable With

Core Impact

Metasploit (MS11-006 Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow)

Reference Information

CVE: CVE-2010-3970

BID: 45662

CERT: 106516

IAVA: 2011-A-0019-S

MSFT: MS11-006

MSKB: 2483185