Short Name |
SMTP:MAL:BMP-MAL-HEADER |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
SMTP |
Keywords |
BMP Malformed Header Buffer Overflow |
Release Date |
2006/02/14 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects the e-mail transmission of a Windows Bitmap (.bmp) file containing a maliciously crafted header. Viewing this image in Windows Media Player can exploit a buffer overflow condition, leading to arbitrary code execution.
Microsoft Windows Media Player is prone to a remote buffer-overflow vulnerability. The vulnerability arises when the application handles a skin file containing a specially crafted bitmap image. This issue can also be triggered by just supplying a malicious bitmap to the application. Note, however, that Windows Media Player is not the default handler for bitmap files. A successful attack can corrupt process memory and result in arbitrary code execution. This may facilitate a remote compromise in the context of the vulnerable user.