Advisory Details

March 8th, 2016

Microsoft Windows OleLoadPicture Bitmap Heap Corruption Remote Code Execution Vulnerability

ZDI-16-182
ZDI-CAN-3433

CVE ID CVE-2016-0091
CVSS SCORE 6.8, AV:N/AC:M/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['22661']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the OleLoadPicture function. User-supplied data is used to calculate a buffer length for allocation, and if the image is a bitmap, the function can then write beyond the buffer boundary. An attacker can leverage this functionality to execute arbitrary code in the context of the user.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://technet.microsoft.com/en-us/library/security/MS16-030
DISCLOSURE TIMELINE
  • 2015-12-03 - Vulnerability reported to vendor
  • 2016-03-08 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES