Short Name |
HTTP:STC:IMG:TARGA-IMG-HEAP |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft DirectX RLE Compressed Targa Image File Heap Overflow |
Release Date |
2010/10/13 |
Update Number |
1791 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in Microsoft DirectX application framework. It is due to the way certain DirectX libraries handle specially crafted Targa (TGA) image files that are compressed using the Run-Length Encoding (RLE) method. A remote attacker can exploit this by persuading a user to open a specially crafted TGA file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user. In a successful code injection attack, the behavior of the target is entirely dependent on the intended function of the injected code. It executes within the security context of the current user. In an unsuccessful code injection attack, the application using the affected application terminates immediately.
A heap-based buffer-overflow vulnerability occurs in the Microsoft Windows DirectX component. This issue is related to the processing of compressed Targa image files. The specific vulnerability occurs because of the way these files are opened. A successful exploit will permit attackers to execute arbitrary code in the context of the user who opens a malicious RLE Targa image file. An attacker can exploit this issue through any means that will allow the attacker to deliver a malicious Targa file to a victim user. In web-based attack scenarios, exploits could occur automatically if the malicious page can cause the file to be loaded automatically by Windows Media Player. Other attack vectors such as email or instant messaging may require the victim user to manually open the malicious Targa file.