Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:MS-THEME-RCE

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Windows Theme File Remote Code Execution

Release Date

2013/09/10

Update Number

2298

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Windows Theme File Remote Code Execution


This signature detects attempts to exploit a known vulnerability against Microsoft Windows Theme. A successful attack can lead to memory corruption and arbitrary code execution.

Extended Description

Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, and Windows Server 2008 SP2 allow remote attackers to execute arbitrary code via a crafted screensaver in a theme file, aka "Windows Theme File Remote Code Execution Vulnerability."

Affected Products

  • microsoft windows_server_2003 (sp2:itanium)
  • microsoft windows_server_2003 (sp2:x64)
  • microsoft windows_server_2008 (sp2:itanium)
  • microsoft windows_server_2008 (sp2:x64)
  • microsoft windows_server_2008 (sp2:x86)
  • microsoft windows_vista (sp2:x64)
  • microsoft windows_xp - (sp2:x64)
  • microsoft windows_xp (sp3)

References

  • CVE: CVE-2013-0810

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out