WelcomeEnterpriseSmall BusinessHome & Home OfficePartnersAbout Symantec

Microsoft Internet Explorer PNG Deflate Heap Corruption Vulnerability

Risk
High

Date Discovered
12-12-2002

Description
A heap corruption vulnerability has been reported for Microsoft Internet Explorer.

The vulnerability is related to the way that Microsoft Internet Explorer interprets PNG image data. The function that handles the deflation of PNG images does not properly handle some invalid data within PNG image files.

An attacker can exploit this vulnerability by tricking a user into viewing a maliciously constructed PNG image file. When the image file is rendered it will trigger the heap corruption condition and overwrite critical areas in memory. Any malicious attacker-supplied code will be executed with elevated privileges.

It should be noted that applications which depend on MSIE to render PNG files are also affected.

Platforms Affected
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Server
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Terminal Services
Microsoft Windows 2000 Terminal Services SP1
Microsoft Windows 2000 Terminal Services SP2
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows 98SE
Microsoft Windows ME
Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows NT Enterprise Server 4.0 SP1
Microsoft Windows NT Enterprise Server 4.0 SP2
Microsoft Windows NT Enterprise Server 4.0 SP3
Microsoft Windows NT Enterprise Server 4.0 SP4
Microsoft Windows NT Enterprise Server 4.0 SP5
Microsoft Windows NT Enterprise Server 4.0 SP6
Microsoft Windows NT Enterprise Server 4.0 SP6a
Microsoft Windows NT Server 4.0
Microsoft Windows NT Server 4.0 SP1
Microsoft Windows NT Server 4.0 SP2
Microsoft Windows NT Server 4.0 SP3
Microsoft Windows NT Server 4.0 SP4
Microsoft Windows NT Server 4.0 SP5
Microsoft Windows NT Server 4.0 SP6
Microsoft Windows NT Server 4.0 SP6a
Microsoft Windows NT Terminal Server 4.0
Microsoft Windows NT Terminal Server 4.0 SP1
Microsoft Windows NT Terminal Server 4.0 SP2
Microsoft Windows NT Terminal Server 4.0 SP3
Microsoft Windows NT Terminal Server 4.0 SP4
Microsoft Windows NT Terminal Server 4.0 SP5
Microsoft Windows NT Terminal Server 4.0 SP6
Microsoft Windows NT Terminal Server 4.0 SP6a
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Workstation 4.0 SP1
Microsoft Windows NT Workstation 4.0 SP2
Microsoft Windows NT Workstation 4.0 SP3
Microsoft Windows NT Workstation 4.0 SP4
Microsoft Windows NT Workstation 4.0 SP5
Microsoft Windows NT Workstation 4.0 SP6
Microsoft Windows NT Workstation 4.0 SP6a

Components Affected
Microsoft Internet Explorer 5.0.1 SP2
Microsoft Internet Explorer 5.0.1 SP1
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5 SP2
Microsoft Internet Explorer 5.5 SP1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0

Recommendations
Run all client software as a non-privileged user with minimal access rights.
Browsing the web as a low-privileged user will limit the consequences of malicious code being executed.

Do not follow links provided by unknown or untrusted sources.
Be extremely careful when following links sent by unknown individuals. If possible, always ensure that any email that has been received is solicited before reading the contents.

This vulnerability has been resolved in MSIE 6.0 SP 1. Users are advised to obtain the latest version of MSIE.


Microsoft Internet Explorer 5.0.1 SP2:

Microsoft Patch q328970
http://www.microsoft.com/windows/ie/downloads/critical/q328970/default.asp

Microsoft Internet Explorer 5.0.1 SP1:
Microsoft Patch q328970
http://www.microsoft.com/windows/ie/downloads/critical/q328970/default.asp

Microsoft Internet Explorer 5.0.1:
Microsoft Patch q328970
http://www.microsoft.com/windows/ie/downloads/critical/q328970/default.asp

Microsoft Internet Explorer 5.5 SP2:
Microsoft Patch q328970
http://www.microsoft.com/windows/ie/downloads/critical/q328970/default.asp

Microsoft Internet Explorer 5.5 SP1:
Microsoft Patch q328970
http://www.microsoft.com/windows/ie/downloads/critical/q328970/default.asp

Microsoft Internet Explorer 5.5:
Microsoft Patch q328970
http://www.microsoft.com/windows/ie/downloads/critical/q328970/default.asp

Microsoft Internet Explorer 6.0:
Microsoft Patch ie6sp1
http://www.microsoft.com/windows/ie/downloads/critical/ie6sp1/default.asp
Microsoft Patch q328970
http://www.microsoft.com/windows/ie/downloads/critical/q328970/default.asp

References
Source: Microsoft Security Bulletin MS02-066
URL: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-066.asp

Credits
Vulnerability discovery credited to Eeye Digital Security.


Copyright (c) 2002 by Symantec Corp.
Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from symsecurity@symantec.com.

Disclaimer
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.

Symantec, Symantec products, Symantec Security Response, and SymSecurity are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.

[an error occurred while processing this directive]