First published: Tue Apr 08 2008(Updated: )
Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka "GDI Stack Overflow Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | ||
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows NT | =2008 | |
Microsoft Windows NT | =2008 | |
Microsoft Windows Vista | ||
Microsoft Windows NT | =2008 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1087 has a high severity rating due to the potential for remote code execution.
To fix CVE-2008-1087, apply security updates or patches provided by Microsoft for the affected Windows versions.
CVE-2008-1087 affects Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008.
CVE-2008-1087 allows attackers to execute arbitrary code remotely by exploiting a stack-based buffer overflow.
While there is no official workaround for CVE-2008-1087, avoiding opening untrusted EMF image files can help mitigate the risk.