vulnerability
Microsoft CVE-2017-0061: Microsoft Color Management Information Disclosure Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:N/AC:H/Au:N/C:P/I:N/A:N) | Mar 14, 2017 | Mar 14, 2017 | Aug 23, 2019 |
Severity
3
CVSS
(AV:N/AC:H/Au:N/C:P/I:N/A:N)
Published
Mar 14, 2017
Added
Mar 14, 2017
Modified
Aug 23, 2019
Description
Multiple information disclosure vulnerabilities exist in the way that the Color Management Module (ICM32.dll) handles objects in memory. These vulnerabilities allow an attacker to retrieve information to bypass usermode ASLR (Address Space Layout Randomization) on a targeted system. By itself, the information disclosures do not allow arbitrary code execution; however, they could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability.
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.
The security update addresses the vulnerability by correcting how Color Management Module handles objects in memory.
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.
The security update addresses the vulnerability by correcting how Color Management Module handles objects in memory.
Solutions
msft-kb4012212-13c36c25-fee4-429f-933e-f93ebfbb91f5msft-kb4012212-36e1591a-f6d3-44d2-aa25-540234b7eb36msft-kb4012212-4ee6f09d-38d9-47ef-8ba9-dd802352b8eemsft-kb4012212-652eea96-c2e8-4548-8f9a-40964e5e6a74msft-kb4012212-c682d11d-fc2e-4852-9da7-c2198958bf6cmsft-kb4012212-fb31138f-b6a5-499c-9eb6-5b5f9fff6bfdmsft-kb4012584-141a8898-360a-47f4-a958-74f54c4e77b3msft-kb4012584-176cbd00-9a76-40c0-bee4-fea6cb6f553cmsft-kb4012584-6c7474f4-ccb5-418b-8337-fb4108ae1a26msft-kb4012584-8c96ce7e-5c8b-4a7e-a137-751ecbc0bae3msft-kb4012584-d5a116c1-9aef-474a-94b7-c6b9415d2812msft-kb4012584-effbab6a-de82-43aa-8b8c-55dc72ab5864
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.