Remote Code Execution Vulnerabilities in GDI+ - MS09-062ID: oval:org.secpod.oval:def:2663 | Date: (C)2011-10-31 (M)2023-12-14 |
Class: PATCH | Family: windows |
The host is missing a critical security update according to Microsoft security bulletin, MS09-062. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Windows GDI+, which fails to validate data within GDI+ when rendering WMF images and improper buffer management when rendering a PNG file, TIFF files and .NET API calls. Successful exploitation allows an attacker to execute arbitrary code or take complete control of an affected system.
Platform: |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows 2000 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2003 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Vista |
Microsoft Windows XP |
Microsoft Windows Server 2008 R2 |
Product: |
Microsoft Internet Explorer 6 |
Microsoft Office XP |
Microsoft Office 2003 |
Microsoft Office 2007 |
Microsoft Visual Studio 2008 |
Microsoft SQL Server 2005 |
Microsoft .NET Framework 1.1 |
Microsoft Office Compatibility Pack |
Microsoft PowerPoint Viewer 2007 |
Microsoft Word Viewer |
Microsoft Visual Studio 2005 |
Microsoft Excel Viewer 2003 |
Microsoft .NET Framework 2.0 |
Microsoft Visio 2002 |
Microsoft Project 2002 |