MS11-006: Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185)

High Nessus Plugin ID 51906

Synopsis

It may be possible to execute arbitrary code on the remote host using the graphics rendering engine.

Description

If a remote attacker can trick a user on the affected host into opening a specially crafted bitmap file, a vulnerability in the graphics rendering engine that arises due to its failure to validate the 'biClrUsed' parameter could be leveraged to execute arbitrary code on the host subject to the user's privileges.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2011/ms11-006

Plugin Details

Severity: High

ID: 51906

File Name: smb_nt_ms11-006.nasl

Version: 1.23

Type: local

Agent: windows

Published: 2011/02/08

Updated: 2018/11/15

Dependencies: 57033, 13855

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/02/08

Vulnerability Publication Date: 2010/12/15

Exploitable With

Core Impact

Metasploit (MS11-006 Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow)

Reference Information

CVE: CVE-2010-3970

BID: 45662

IAVA: 2011-A-0019

CERT: 106516

MSFT: MS11-006

MSKB: 2483185