CVE-2009-1217 : Detail

CVE-2009-1217

46.23%V4
Network
2009-04-01
15h00 +00:00
2017-08-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Off-by-one error in the GpFont::SetData function in gdiplus.dll in Microsoft GDI+ on Windows XP allows remote attackers to cause a denial of service (stack corruption and application termination) via a crafted EMF file that triggers an integer overflow, as demonstrated by voltage-exploit.emf, aka the "Microsoft GdiPlus EMF GpFont.SetData integer overflow."

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-193 Off-by-one Error
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 8281

Publication date : 2009-03-23 23h00 +00:00
Author : Black Security
EDB Verified : Yes

Microsoft GdiPlus.dll EMF GpFont::SetData Stack Overflow Write up by redsand@blacksecurity.org : http://bl4cksecurity.blogspot.com/2009/03/microsoft-gdiplus-emf-gpfontsetdata.html Credits to mIKEJONES for providing the .EMF Crash down: http://www.blacksecurity.org/voltage-exploit.emf back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8281.emf (2009-voltage-exploit.emf) # milw0rm.com [2009-03-24]

Products Mentioned

Configuraton 0

Microsoft>>Gdi\+ >> Version -

Microsoft>>Windows_xp >> Version -

References

http://www.vupen.com/english/advisories/2009/0832
Tags : vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/34250
Tags : vdb-entry, x_refsource_BID