WelcomeEnterpriseSmall BusinessHome & Home OfficePartnersAbout Symantec

Microsoft Windows Graphics Rendering Engine WMF/EMF Format Code Execution Vulnerability

Risk
High

Date Discovered
11-08-2005

Description
Microsoft Windows WMF/EMF graphics rendering engine is affected by a remote code execution vulnerability.

The problem presents itself when a user views a malicious WMF or EMF formatted file causing the affected engine to attempt to parse it. Exploitation of this issue can trigger an integer overflow that may facilitate heap memory corruption and arbitrary code execution.

Any code execution that occurs will be with SYSTEM privileges due to the nature of the affected engine. Successful exploitation can facilitate a remote compromise or local privilege escalation.

Symantec Enterprise Security Manager
Symantec Enterprise Security Manager posted an update to the OS Patch Policy that detects and reports systems that are not patched against this vulnerability. Click here for the advisory released November 10, 2005.

Symantec Enterprise Security Manager Network Assessment Module
Symantec Enterprise Security Manager Network Assessment Module detects and reports this vulnerability. Click here for the advisory released November 11, 2005.

Symantec Vulnerability Assessment
Symantec Vulnerability Assessment detects and reports this vulnerability. Click here for the advisory released November 8, 2005.

Platforms Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya S3400 Message Application Server
Avaya S8100 Media Servers

Components Affected
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Professional SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Server SP4
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
Microsoft Windows Server 2003 Datacenter Edition SP1
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Datacenter Edition 64-bit SP1
Microsoft Windows Server 2003 Datacenter Edition 64-bit
Microsoft Windows Server 2003 Datacenter x64 Edition
Microsoft Windows Server 2003 Enterprise Edition SP1
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Enterprise Edition 64-bit SP1
Microsoft Windows Server 2003 Enterprise Edition 64-bit
Microsoft Windows Server 2003 Enterprise x64 Edition
Microsoft Windows Server 2003 Standard Edition SP1
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Standard x64 Edition
Microsoft Windows Server 2003 Web Edition SP1
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP Home SP2
Microsoft Windows XP Home SP1
Microsoft Windows XP Home
Microsoft Windows XP Media Center Edition SP2
Microsoft Windows XP Media Center Edition SP1
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Professional SP2
Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows XP Tablet PC Edition SP2
Microsoft Windows XP Tablet PC Edition SP1
Microsoft Windows XP Tablet PC Edition

Recommendations
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Do not allow untrusted individuals to have local access to computers. This may limit exposure to local attack vectors.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy network intrusion detection systems to monitor all network traffic for signs of suspicious or anomalous activity. This may aid in detecting attempts to exploit latent vulnerabilities or in detecting malicious activity that occurs as a result of successful exploitation.

Do not accept or execute files from untrusted or unknown sources.
Users should not accept files from untrusted or unknown sources as they may be malicious in nature.

Do not follow links provided by unknown or untrusted sources.
Users should avoid Web sites of questionable integrity and not follow links supplied by unknown or untrusted sources.

Do not accept communications that originate from unknown or untrusted sources.
Disabling client support for HTML email may limit exposure to this attack vector.

Implement multiple redundant layers of security.
As it may be possible that this issue will be leveraged to execute code, memory protection schemes are recommended. Memory protection schemes such as non-executable stack/heap configurations and randomly mapped memory segments will complicate exploitation of memory corruption vulnerabilities.

Microsoft has released a bulletin that includes fixes to address this issue for supported versions of the operating system.


Microsoft Windows 2000 Advanced Server SP4:

Microsoft Upgrade Security Update for Windows 2000 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=F361FCCB-B273-47E7-BB15-BC9C27073446&displaylang=en

Microsoft Windows 2000 Advanced Server SP3:
Microsoft Windows 2000 Advanced Server SP2:
Microsoft Windows 2000 Advanced Server SP1:
Microsoft Windows 2000 Advanced Server :
Microsoft Windows 2000 Datacenter Server SP4:
Microsoft Upgrade Security Update for Windows 2000 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=F361FCCB-B273-47E7-BB15-BC9C27073446&displaylang=en

Microsoft Windows 2000 Datacenter Server SP3:
Microsoft Windows 2000 Datacenter Server SP2:
Microsoft Windows 2000 Datacenter Server SP1:
Microsoft Windows 2000 Datacenter Server :
Microsoft Windows 2000 Professional SP4:
Microsoft Upgrade Security Update for Windows 2000 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=F361FCCB-B273-47E7-BB15-BC9C27073446&displaylang=en

Microsoft Windows 2000 Professional SP3:
Microsoft Windows 2000 Professional SP2:
Microsoft Windows 2000 Professional SP1:
Microsoft Windows 2000 Professional :
Microsoft Windows 2000 Server SP4:
Microsoft Upgrade Security Update for Windows 2000 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=F361FCCB-B273-47E7-BB15-BC9C27073446&displaylang=en

Microsoft Windows 2000 Server SP3:
Microsoft Windows 2000 Server SP2:
Microsoft Windows 2000 Server SP1:
Microsoft Windows 2000 Server :
Microsoft Windows Server 2003 Datacenter Edition SP1:
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows Server 2003 Datacenter Edition :
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows Server 2003 Datacenter Edition 64-bit SP1:
Microsoft Upgrade Security Update for Windows Server 2003 for Itanium-based systems (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CCFF22BB-ADC4-4974-813C-7721BDB842C0&displaylang=en

Microsoft Windows Server 2003 Datacenter Edition 64-bit :
Microsoft Upgrade Security Update for Windows Server 2003 for Itanium-based systems (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CCFF22BB-ADC4-4974-813C-7721BDB842C0&displaylang=en

Microsoft Windows Server 2003 Datacenter x64 Edition :
Microsoft Upgrade Security Update for Windows Server x64 Edition (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=F1ADB6E4-0A08-496C-B94C-A1B37178914A&displaylang=en

Microsoft Windows Server 2003 Enterprise Edition SP1:
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows Server 2003 Enterprise Edition :
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows Server 2003 Enterprise Edition 64-bit SP1:
Microsoft Upgrade Security Update for Windows Server 2003 for Itanium-based systems (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CCFF22BB-ADC4-4974-813C-7721BDB842C0&displaylang=en

Microsoft Windows Server 2003 Enterprise Edition 64-bit :
Microsoft Upgrade Security Update for Windows Server 2003 for Itanium-based systems (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CCFF22BB-ADC4-4974-813C-7721BDB842C0&displaylang=en

Microsoft Windows Server 2003 Enterprise x64 Edition :
Microsoft Upgrade Security Update for Windows Server x64 Edition (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=F1ADB6E4-0A08-496C-B94C-A1B37178914A&displaylang=en

Microsoft Windows Server 2003 Standard Edition SP1:
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows Server 2003 Standard Edition :
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows Server 2003 Standard x64 Edition :
Microsoft Upgrade Security Update for Windows Server x64 Edition (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=F1ADB6E4-0A08-496C-B94C-A1B37178914A&displaylang=en

Microsoft Windows Server 2003 Web Edition SP1:
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows Server 2003 Web Edition :
Microsoft Upgrade Security Update for Windows Server 2003 (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=CEE3DD3B-3C20-47A9-8BBD-1EA2FBB4AF96&displaylang=en

Microsoft Windows XP 64-bit Edition :
Microsoft Upgrade Security Update for Windows XP x64 Edition (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=086C6878-916C-4A4F-8CA8-A4C0E304FDA4&displaylang=en

Microsoft Windows XP Home SP2:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Home SP1:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Home :
Microsoft Windows XP Media Center Edition SP2:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Media Center Edition SP1:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Media Center Edition :
Microsoft Windows XP Professional SP2:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Professional SP1:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Professional :
Microsoft Windows XP Tablet PC Edition SP2:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Tablet PC Edition SP1:
Microsoft Upgrade Security Update for Windows XP (KB896424)
http://www.microsoft.com/downloads/details.aspx?familyid=E38372B2-3BF6-4393-B9A4-F34248C8073E&displaylang=en

Microsoft Windows XP Tablet PC Edition :

References
Source: Microsoft Security Bulletin MS05-053
URL: http://www.microsoft.com/technet/security/Bulletin/MS05-053.mspx

Source: Windows Metafile Multiple Heap Overflows
URL: http://www.eeye.com/html/research/advisories/AD20051108b.html

Credits
Discovery is credited to eEye Digital Security.


Copyright (c) 2009 by Symantec Corp.
Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from secure@symantec.com.

Disclaimer
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.

Symantec, Symantec products, Symantec Security Response, and secure@symantec.com are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.