A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.
The vulnerability is caused due to an error while drawing in kernel space by using the Canonical Display Driver (cdd.dll). This can be exploited to dereference invalid memory in a write operation and corrupt kernel memory.
Successful exploitation may allow execution of arbitrary code, but requires that the user e.g. renders specially crafted images using IrfanView.
The vulnerability is confirmed on a local account on a 64-bit Windows 7 and additionally reported in Windows Server 2008 R2 for x64 or Itanium systems with Windows Aero enabled (disabled by default).
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Microsoft Windows Canonical Display Driver Memory Corruption
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.