Short Name |
HTTP:STC:DL:VML-GRADIENT |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Windows Graphics Rendering Engine VML Gradient Buffer Overflow |
Release Date |
2010/10/25 |
Update Number |
1798 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Graphics Rendering Engine (GRE) component of Microsoft Windows. It is due to the way that GDI+ handles gradient sizes. An attacker can exploit this by enticing a user to browse a malicious Web site with specially crafted content. A successful attack can lead to denial of service or in the injection and execution of arbitrary code with the privileges of the currently logged in user. The behavior of the target is entirely dependent on the intended function of the injected code. In an unsuccessful attack, the affected application using the vulnerable gdiplus.dll terminates abnormally.
Microsoft GDI+ is prone to a heap-based buffer-overflow vulnerability because the vector graphics link library improperly processes gradient sizes. Successfully exploiting this issue would allow an attacker to corrupt heap memory and execute arbitrary code in the context of the currently logged-in user.