=====================================================================
                                   CERT-Renater

                        Note d'Information No. 2011/VULN091
_____________________________________________________________________

DATE                      : 09/02/2011

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Windows XP, Windows Server 2003,
                             Windows Vista, Windows Server 2008.

======================================================================
KB2483185
http://www.microsoft.com/technet/security/bulletin/MS11-006.mspx
______________________________________________________________________

Microsoft Security Bulletin MS11-006 - Critical
Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code
Execution (2483185)

Version: 1.0

General Information

Executive Summary

This security update resolves a publicly disclosed vulnerability in the Windows
Shell graphics processor. The vulnerability could allow remote code execution
if a user views a specially crafted thumbnail image. An attacker who
successfully exploited this vulnerability could gain the same user rights as
the logged-on user. Users whose accounts are configured to have fewer user
rights on the system could be less impacted than users who operate with
administrative user rights.

This security update is rated Critical for all supported editions of Windows
XP, Windows Server 2003, Windows Vista, and Windows Server 2008. Supported
editions of Windows 7 and Windows Server 2008 R2 are not affected by the
vulnerability. For more information, see the subsection, Affected and Non-
Affected Software, in this section.

The security update addresses the vulnerability by correcting the manner in
which the Windows Shell graphics processor parses thumbnail images. For more
information about the vulnerability, see the Frequently Asked Questions (FAQ)
subsection for the specific vulnerability entry under the next section,
Vulnerability Information.

This security update also addresses the vulnerability first described in
Microsoft Security Advisory 2490606.

Affected Software

Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition
  Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit
  Systems Service Pack 2**
Windows Server 2008 for x64-based Systems and Windows Server 2008 for
  x64-based Systems Service Pack 2**
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for
  Itanium-based Systems Service Pack 2

Vulnerability Information

Windows Shell Graphics Processing Overrun Vulnerability - CVE-2010-3970

A remote code execution vulnerability exists in the way that the Windows
Shell graphics processor handles specially crafted thumbnail images. An
attacker who successfully exploited this vulnerability could run arbitrary
code in the security context of the logged-on user. An attacker could then
install programs; view, change, or delete data; or create new accounts with
full user rights. Users whose accounts are configured to have fewer user
rights on the system could be less impacted than users who operate with
administrative user rights.


======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================

