vulnerability

Microsoft Windows: CVE-2017-0038: Windows GDI Information Disclosure Vulnerability

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Mar 14, 2017
Added
Mar 14, 2017
Modified
Sep 6, 2024

Description

gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220.

Solution(s)

microsoft-windows-windows_10-1507-kb4012606microsoft-windows-windows_10-1511-kb4013198microsoft-windows-windows_10-1607-kb4013429microsoft-windows-windows_server_2012-kb4012214microsoft-windows-windows_server_2012_r2-kb4012213microsoft-windows-windows_server_2016-1607-kb4013429msft-kb4012212-13c36c25-fee4-429f-933e-f93ebfbb91f5msft-kb4012212-36e1591a-f6d3-44d2-aa25-540234b7eb36msft-kb4012212-4ee6f09d-38d9-47ef-8ba9-dd802352b8eemsft-kb4012212-652eea96-c2e8-4548-8f9a-40964e5e6a74msft-kb4012212-c682d11d-fc2e-4852-9da7-c2198958bf6cmsft-kb4012212-fb31138f-b6a5-499c-9eb6-5b5f9fff6bfdmsft-kb4012213-317ca43c-7dfe-4e04-8a21-2c6c4ab4fbb9msft-kb4012213-5d351df3-6efb-4b17-93e0-b0e3a5babbc3msft-kb4012214-1949e6d5-95b0-4e90-acfb-73c9d295fbbfmsft-kb4012214-b4d71d8b-1f2d-4958-ad08-e379293d71e8msft-kb4017018-48ae8420-32a4-4c6c-a78e-4af1b879865dmsft-kb4017018-4acb7e5d-a1b0-43b2-9fd6-0b248a2af613msft-kb4017018-5cb42753-dd56-4e21-a9ad-e65bcc551752msft-kb4017018-60a3cf59-dec7-4757-9015-1b30f166dceemsft-kb4017018-c9a4d555-0ded-48b2-8595-72114fac8e3dmsft-kb4017018-cac0b0e7-abbe-4ce8-b6f5-a4a884939899
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.