Arkon has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
The vulnerability is caused due to a boundary error in win32k.sys within the "CreateDIBPalette()" function when copying colour values into a buffer allocated with a fixed size when creating the DIB palette. This can be exploited via the "GetClipboardData()" API to cause a buffer overflow by specifying a large number of colours (greater than 256) via the "biClrUsed" field in a BITMAPINFOHEADER structure.
Successful exploitation may allow execution of arbitrary code with kernel privileges.
The vulnerability is confirmed in fully patched versions of Windows XP SP3, Windows Server 2003 R2 Enterprise SP2, Windows Vista Business SP1, Windows 7, and Windows Server 2008 SP2.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Microsoft Windows win32k.sys Driver "CreateDIBPalette()" Buffer Overflow
RE: Microsoft Windows win32k.sys Driver "CreateDIBPalette()" Buffer Overflow
7th Aug, 2010 19:09
Score: 376 Posts: 872 User Since: 3rd May 2009 System Score: 100% Location: US
This thread is not meant for general discussion or comment. The only reason to post here is if you have knowledge of the vulnerability.
If you wish to start a thread:
For help 'fixing' a specific problem, start a new thread. Click on "Create Thread", on the left. You can also click on the "Create new thread" button, at the top of the list of threads (directly under the search box).
To ask a question about a particular program, select "Programs" forum. To ask about PSI, select "PSI" forum, etc.
In the "Topic" box, use something descriptive like "Adobe Reader download fails", this will get help faster.
-- XP Home
Chrome, Firefox, IE8
consilio et animis
Was this reply relevant?
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.