Two vulnerabilities have been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.
1) An input validation error in the Fax Cover Page Editor (fxscover.exe) when the "CDrawPoly::Serialize()" function reads in data from a Fax Cover Page file (".cov") can be exploited to cause a heap-based buffer overflow via a Fax Cover Page file containing specially crafted content.
This vulnerability is confirmed in fully patched versions of Windows XP Professional SP3, Windows Server 2003 R2 Enterprise Edition SP2, and Windows 7 Professional. Other versions may also be affected.
2) A use-after-free error in the Fax Cover Page Editor (fxscover.exe) when processing a Fax Cover Page file (".cov") can be exploited to dereference freed memory to load an object pointer for use in a virtual function call via a specially crafted file.
This vulnerability is confirmed in a fully patched version of Windows XP Professional SP3. Other versions may also be affected.
Successful exploitation of these vulnerabilities allows execution of arbitrary code, but requires that "Fax Services" / "Windows Fax and Scan" is installed.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Microsoft Windows Fax Cover Page Editor Two Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.