Microsoft GDI+通过基于类的API提供对各种图形方式的访问。 多款Microsft软件(Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0)使用的GDI+中的gdiplus.dll存在缓冲区溢出溢出漏洞。 远程攻击者可利用畸形的WMF图片文件触发非法内存分配,从而执行任意代码。 该漏洞也称为"GDI+ WMF 缓冲区溢出漏洞"
Microsoft GDI+通过基于类的API提供对各种图形方式的访问。 多款Microsft软件(Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0)使用的GDI+中的gdiplus.dll存在缓冲区溢出溢出漏洞。 远程攻击者可利用畸形的WMF图片文件触发非法内存分配,从而执行任意代码。 该漏洞也称为"GDI+ WMF 缓冲区溢出漏洞"