Re: Windows GDI Interface Buffer Overflow Vulnerability



=?Utf-8?B?a29j?= <koc@xxxxxxxxxxxxxxxxxxxxxxxxx> wrote in
news:4EB5FCD5-D8FB-4426-B889-47A212E7BB2F@xxxxxxxxxxxxx:

Our security reporter send us a mail about Windows GDI
Interface Buffer Overflow Vulnerability in last
mounth.There isn't any patch for this vulnerability .But a
workaround solve this security problem according to my
reporter.This workaround is :

Turn off metafile processing by modifying the registry.
Under registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\GRE_Initialize
create a DWORD entry "DisableMetaFiles" and set it to 1.


Can you tell me this workaround is true and trustable ? and
what do you think about this security vulnerability? Thanks
Also I am located in Turkey


See [wraps]:
http://www.microsoft.com/technet/security/bulletin/ms07-
046.mspx

J
--
Replies to: Nherr1professor2doktor31109(at)Oyahoo(dot)Tcom
.