Short Name |
HTTP:STC:DL:OFFICE-BMP-HEADER |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Office Image Filter Crafted BMP Header Buffer Overflow |
Release Date |
2010/10/12 |
Update Number |
1790 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Image Filter shipped with Microsoft Office. It is due to improper validation of the number of used colors in BMP header. A remote unauthenticated attacker can exploit this by enticing a user to open a malicious BMP image with the affected application, causing the execution of arbitrary code in the security context of the current user. An attack targeting this vulnerability can result in the injection and execution of code. If successful, the behavior of the target depends on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In an unsuccessful attack, the affected application can terminate resulting in the loss of any unsaved data from the current session.
Microsoft Office is prone to a remote code-execution vulnerability. An attacker could exploit this issue by enticing a victim to open a malicious BMP file. Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.