{"vuid":"VU#923236","idnumber":"923236","name":"Microsoft Windows ART image handling buffer overflow","keywords":["Microsoft","Internet Explorer","arbitrary code execution",".art file","heap corruption MS06-022","ms06-june"],"overview":"Microsoft Windows ART image handling routines are vulnerable to a heap-based buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"ART Images According to Microsoft Security Bulletin MS06-022: ART is an image file format used by the America Online (AOL) client software. Windows also includes the library and Internet Explorer displays ART images. The Problem Microsoft Windows fails to properly handle malformed ART images allowing in a heap-based buffer overflow to occur. If a remote attacker can persuade a user to access specially crafted ART image, that attacker may be able to trigger the overflow. Considerations According to Microsoft Security Bulletin MS06-022: Windows 2000 does not support AOL ART images by default. Windows 2000 is only affected if the Windows 2000 AOL Image Support Update has been installed. For more information refer to Microsoft Security Bulletin MS06-022.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code. If the attacked user is running with administrative privileges, the attacker could take complete control of an affected system.","resolution":"Apply a patch from Microsoft\nMicrosoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-022.","workarounds":"For a list of workarounds refer to Microsoft Security Bulletin MS06-022.","sysaffected":"","thanks":"This vulnerability was reported by \niDefense","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/Bulletin/MS06-022.mspx","http://www.idefense.com/intelligence/vulnerabilities/display.php?id=407"],"cveids":["CVE-2006-2378"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-02-14T19:25:29Z","publicdate":"2006-06-13T00:00:00Z","datefirstpublished":"2006-06-13T19:03:48Z","dateupdated":"2006-06-14T14:20:27Z","revision":30,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"19","cam_impact":"20","cam_easeofexploitation":"13","cam_attackeraccessrequired":"20","cam_scorecurrent":"55.575","cam_scorecurrentwidelyknown":"64.8375","cam_scorecurrentwidelyknownexploited":"101.8875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":55.575,"vulnote":null}