Saturday, October 2, 2010

libgdiplus: DoS, code execution vulnerability

Users of libgdiplus please be advised of a DoS, code execution vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
USN-993-1: [USN-993-1] libgdiplus DoS, code execution vulnerability
Details follow:



Stefan Cornelius discovered that libgdiplus incorrectly handled certain

image files. If a user or automated system were tricked into opening a

crafted image file, an attacker could cause a denial of service or possibly

execute arbitrary code with the privileges of the user invoking the

program.
Read more at www.criticalwatch.com
 

No comments:

Post a Comment