CVE-2005-2123 (CNNVD-200511-472)
中文标题:
Microsoft Windows图形渲染引擎整数溢出漏洞(MS05-053)
英文标题:
Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 ...
漏洞描述
中文描述:
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Microsoft Windows在渲染Windows图元文件(WMF)和增强型图元文件(EMF)图形格式时存在缓冲区溢出漏洞,成功利用这个漏洞的攻击者可以远程执行任意代码。 负责解析Windows图元文件的GDI32.DLL代码的PlayMetaFileRecord函数中存在缓冲区溢出漏洞。该函数的36h和37h处理"SetPaletteEntries"-类型记录。如果记录的报告长度是7FFFFFFFh或FFFFFFFFh的话,以下代码就会出现整数溢出: 77F5BC38 mov eax, [ebx] ; length field 77F5BC3A lea eax, [eax+eax+2] ; *** integer overflow *** 77F5BC3E push eax 77F5BC3F push edi 77F5BC40 call ds:LocalAlloc ... 77F5BC51 mov ecx, [ebx] ; length field 77F5BC53 add eax, 2 77F5BC56 shl ecx, 1 ; copy size != allocation size 77F5BC58 mov edx, ecx ; intrinsic memcpy() follows 77F5BC5A mov esi, ebx 77F5BC5C mov edi, eax 77F5BC5E shr ecx, 2 77F5BC61 rep movsd 77F5BC63 mov ecx, edx 77F5BC65 and ecx, 3 ... 77F5BC6D rep movsb
英文描述:
Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| microsoft | windows_2000 | * | - | - |
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
|
| microsoft | windows_2003_server | 64-bit | - | - |
cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | itanium | - | - |
cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | r2 | - | - |
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | sp1 | - | - |
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
|
| microsoft | windows_xp | * | - | - |
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-2123 |
2025-11-11 15:17:34 | 2025-11-11 07:32:27 |
| NVD | nvd_CVE-2005-2123 |
2025-11-11 14:51:20 | 2025-11-11 07:41:13 |
| CNNVD | cnnvd_CNNVD-200511-472 |
2025-11-11 15:08:48 | 2025-11-11 07:49:02 |
| EXPLOITDB | exploitdb_EDB-1346 |
2025-11-11 15:05:50 | 2025-11-11 08:06:11 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 16 -> 21
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200511-472
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 6
- data_sources: ['cve'] -> ['cve', 'nvd']