Vulnerability Details : CVE-2008-1083
Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability."
Vulnerability category: OverflowExecute code
Products affected by CVE-2008-1083
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1083
65.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1083
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-10-15 |
CWE ids for CVE-2008-1083
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2008-1083
-
http://support.microsoft.com/kb/948590
Error - Office.com - Microsoft SupportVendor Advisory
-
http://www.securityfocus.com/bid/28571
Third Party Advisory;VDB Entry
-
http://www.zerodayinitiative.com/advisories/ZDI-08-020/
ZDI-08-020 | Zero Day InitiativeThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5441
404 Not Found
-
http://www.osvdb.org/44214
404 Not FoundBroken Link
-
https://www.exploit-db.com/exploits/5442
Microsoft Windows - GDI Image Parsing Stack Overflow (MS08-021) - Windows local Exploit
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=681
Third Party Advisory
-
http://www.securitytracker.com/id?1019798
GoDaddy Domain Name SearchThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/archive/1/490584/100/0/threaded
-
http://www.securityfocus.com/bid/30933
Third Party Advisory;VDB Entry
-
http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0168.html
Broken Link
-
http://www.osvdb.org/44213
404 Not FoundBroken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41471
Microsoft Windows GDI EMF and WMF header buffer overflow CVE-2008-1083 Vulnerability Report
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021
Microsoft Security Bulletin MS08-021 - Critical | Microsoft Learn
-
http://secunia.com/advisories/29704
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA08-099A.html
Page Not Found | CISAUS Government Resource
-
http://www.kb.cert.org/vuls/id/632963
VU#632963 - Microsoft GDI buffer overflow vulnerabilityUS Government Resource
-
http://www.vupen.com/english/advisories/2008/1145/references
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link
-
http://marc.info/?l=bugtraq&m=120845064910729&w=2
'[security bulletin] HPSBST02329 SSRT080048 rev.1 - Storage Management Appliance (SMA), Microsoft Pat' - MARCMailing List
-
https://www.exploit-db.com/exploits/6330
Microsoft Windows - GDI (CreateDIBPatternBrushPt) Heap Overflow (PoC) - Windows dos Exploit
Jump to