MS11-006: Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185)

high Nessus Plugin ID 51906
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


It may be possible to execute arbitrary code on the remote host using the graphics rendering engine.


If a remote attacker can trick a user on the affected host into opening a specially crafted bitmap file, a vulnerability in the graphics rendering engine that arises due to its failure to validate the 'biClrUsed' parameter could be leveraged to execute arbitrary code on the host subject to the user's privileges.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008.

See Also

Plugin Details

Severity: High

ID: 51906

File Name: smb_nt_ms11-006.nasl

Version: 1.24

Type: local

Agent: windows

Published: 2/8/2011

Updated: 8/5/2020

Dependencies: smb_hotfixes.nasl, ms_bulletin_checks_possible.nasl

Risk Information

CVSS Score Source: CVE-2010-3970


Risk Factor: Critical

Score: 9.7


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/8/2011

Vulnerability Publication Date: 12/15/2010

Exploitable With

Core Impact

Metasploit (MS11-006 Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow)

Reference Information

CVE: CVE-2010-3970

BID: 45662

IAVA: 2011-A-0019-S

CERT: 106516

MSFT: MS11-006

MSKB: 2483185