Re: Alert: Microsoft Security Bulletin MS04-028 - Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution (833987)

From: Patrick Nolan (p.nolan_at_COMCAST.NET)
Date: 09/27/04

  • Next message: Thor: "Re: kerberos!"
    Date:         Mon, 27 Sep 2004 14:44:28 -0700

    Using the SANS GDI detection tool, it located vulnerable gdiplus.dll files
    in other folders not mentioned on websites -

    C:\Program Files\Common Files\Microsoft Shared\Ink\gdiplus.dll
            Version: 5.1.3097.0 <-- Vulnerable version
    C:\Program Files\Common Files\Roxio Shared\DLLShared\gdiplus.dll
            Version: 5.1.3097.0 <-- Vulnerable version
    C:\Program Files\HP\Digital Imaging\HP Print Screen\gdiplus.dll
            Version: 5.1.3097.0 <-- Vulnerable version
    C:\Program Files\HP\hpcoretech\comp\gdiplus.dll
            Version: 5.1.3097.0 <-- Vulnerable version
    C:\Program Files\WS_FTP Pro\gdiplus.dll
            Version: 5.1.3097.0 <-- Vulnerable version

    WS_FTP Pro was a surprise to me.


    Patrick Nolan
    Virus Researcher - Fortinet Inc.

    To Submit A Virus:
    pkzip/winzip password infected to
    submitvirus at fortinet dot com

    NTBugtraq Editor's Note:

    Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field.

  • Next message: Thor: "Re: kerberos!"

    Relevant Pages