CVE-2008-1083

8.1 HIGH
Published: April 08, 2008 Modified: April 23, 2026
View on NVD

Description

Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=681
Source: secure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=120845064910729&w=2
Source: secure@microsoft.com
Mailing List
http://secunia.com/advisories/29704
Source: secure@microsoft.com
Patch Vendor Advisory
http://support.microsoft.com/kb/948590
Source: secure@microsoft.com
Vendor Advisory
http://www.kb.cert.org/vuls/id/632963
Source: secure@microsoft.com
US Government Resource
http://www.osvdb.org/44213
Source: secure@microsoft.com
Broken Link
http://www.osvdb.org/44214
Source: secure@microsoft.com
Broken Link
http://www.securityfocus.com/bid/28571
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30933
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1019798
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-099A.html
Source: secure@microsoft.com
US Government Resource
http://www.zerodayinitiative.com/advisories/ZDI-08-020/
Source: secure@microsoft.com
Third Party Advisory
https://www.exploit-db.com/exploits/5442
Source: secure@microsoft.com
https://www.exploit-db.com/exploits/6330
Source: secure@microsoft.com
http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0168.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=681
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=120845064910729&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://secunia.com/advisories/29704
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://support.microsoft.com/kb/948590
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.kb.cert.org/vuls/id/632963
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.osvdb.org/44213
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.osvdb.org/44214
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/490584/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28571
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30933
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1019798
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-099A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2008/1145/references
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.zerodayinitiative.com/advisories/ZDI-08-020/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41471
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/5442
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/6330
Source: af854a3a-2127-422b-91ae-364da2661108

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.1 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft