{"vuid":"VU#547028","idnumber":"547028","name":"Microsoft Windows contains buffer overflow in processing of WMF and EMF image formats","keywords":["Microsoft","Windows","buffer overflow","Windows Metafile","WMF","Enhanced Metafile","EMF","arbitrary code execution","AD20040413F","Q835732","MS04-011"],"overview":"A vulnerability exists in the APIs that handle Microsoft Windows Metafiles (WMF) and Enhanced Metafiles (EMF) image formats. Exploitation may lead to an attacker executing arbitrary code on the system.","clean_desc":"The code that renders Windows Metafiles (WMF) and Enhanced Metafiles (EMF) image formats contains a heap overflow vulnerability. Many program can be used to render WMF or EMF files and can be used to exploit this vulnerability. If the attacker can trick the victim into opening a maliciously crafted file, then the attacker maybe able to exploit this vulnerability to compromise the system. The following systems are affected by this issue: Windows 2000\nWindows XP\nWindows NT 4.0","impact":"An attacker may be able to execute arbitrary code on the system with the privileges of the current user.","resolution":"Apply a patch from the vendor Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft and eEye Digital Security for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.eeye.com/html/Research/Advisories/AD20040413F.html","http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx"],"cveids":["CVE-2003-0906"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-04-13T19:19:55Z","publicdate":"2004-04-13T00:00:00Z","datefirstpublished":"2004-04-14T05:52:24Z","dateupdated":"2004-04-14T05:53:15Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0,"vulnote":null}