Overview
Microsoft Windows contains a stack-based buffer overflow vulnerability in the graphics rendering engine, which may allow an attacker to execute arbitrary code.
Description
| Microsoft Windows contains a stack-based buffer overflow vulnerability caused by a signedness error in the "CreateSizedDIBSECTION()" function within the shimgvw.dll library when parsing thumbnail bitmaps containing a negative "biClrUsed" value. Exploit code for this vulnerability is publicly available. | 
Impact
| By convincing a user to view a specially crafted file containing a malicious thumbnail bitmap value, an attacker may be able to execute arbitrary code with the privileges of the user. | 
Solution
| Apply an update | 
| Modify the Access Control List (ACL) on shimgvw.dll | 
Vendor Information
| Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability | 
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This document was written by Michael Orlando.
Other Information
| CVE IDs: | CVE-2010-3970 | 
| Severity Metric: | 57.32 | 
| Date Public: | 2011-01-04 | 
| Date First Published: | 2011-01-05 | 
| Date Last Updated: | 2011-02-08 18:22 UTC | 
| Document Revision: | 17 |