Microsoft .NET Framework 1.1 SP1, .NET Framework 2.0 SP1和SP2, Windows XP SP2 和 SP3, Windows Server 2003 SP2, Vista Gold 和 SP1, Server 2008 Gold, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1和SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold和SP3, Office Excel Viewer 2003 Gold 和SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, 和SP2, Word的微软Office文件格式兼容套装, Excel, 和PowerPoint 2007 File Formats SP1和SP2, Expression Web, Expression Web 2, Groove 2007 Gold 和 SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 和 SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold 和 SP1,以及Forefront Client Security 1.0版本的GDI+的未明APIs中存在多个整数值溢出。远程攻击者可以借助(1)特制的XAML浏览器应用程序(XBAP), (2)特制的ASP.NET应用程序或(3)特制的.NET Framework applicati!,执行任意代码。该漏洞又称\"GDI+ .NET API漏洞\"。
Microsoft .NET Framework 1.1 SP1, .NET Framework 2.0 SP1和SP2, Windows XP SP2 和 SP3, Windows Server 2003 SP2, Vista Gold 和 SP1, Server 2008 Gold, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1和SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold和SP3, Office Excel Viewer 2003 Gold 和SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, 和SP2, Word的微软Office文件格式兼容套装, Excel, 和PowerPoint 2007 File Formats SP1和SP2, Expression Web, Expression Web 2, Groove 2007 Gold 和 SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 和 SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold 和 SP1,以及Forefront Client Security 1.0版本的GDI+的未明APIs中存在多个整数值溢出。远程攻击者可以借助(1)特制的XAML浏览器应用程序(XBAP), (2)特制的ASP.NET应用程序或(3)特制的.NET Framework applicati!,执行任意代码。该漏洞又称\"GDI+ .NET API漏洞\"。