Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.
11dbf24cd584445f763c478c26de09149aa94d81f3a4132a83c012799e5dd6a3
----------------------------------------------------------------------
Looking for a job?
Secunia is hiring skilled researchers and talented developers.
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Microsoft Windows Canonical Display Driver Memory Corruption
SECUNIA ADVISORY ID:
SA39577
VERIFY ADVISORY:
http://secunia.com/advisories/39577/
DESCRIPTION:
A vulnerability has been discovered in Microsoft Windows, which can
be exploited by malicious people to cause a DoS (Denial of Service)
or potentially compromise a user's system.
The vulnerability is caused due to an error while drawing in kernel
space by using the Canonical Display Driver (cdd.dll). This can be
exploited to dereference invalid memory in a write operation and
corrupt kernel memory.
Successful exploitation may allow execution of arbitrary code, but
requires that the user renders specially crafted images using e.g.
IrfanView.
The vulnerability is confirmed on a local account on a 64-bit Windows
7, and additionally reported in Windows Server 2008 R2 for x64 or
Itanium systems with Windows Aero enabled (disabled by default).
SOLUTION:
The vendor recommends disabling the Windows Aero Theme.
PROVIDED AND/OR DISCOVERED BY:
Originally reported through an IrfanView forum.
Reported to Secunia by Irfan Skiljan.
ORIGINAL ADVISORY:
Microsoft:
http://www.microsoft.com/technet/security/advisory/2028859.mspx
http://en.irfanview-forum.de/vb/showthread.php?4167-Win-7-Blue-Screen-(cdd-dll)
OTHER REFERENCES:
Microsoft:
http://blogs.technet.com/msrc/archive/2010/05/18/security-advisory-2028859-released.aspx
http://blogs.technet.com/srd/archive/2010/05/18/cdd-dll-vulnerability-difficult-to-exploit.aspx
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------