MS.Kernel.GDI32.POLYLINE.Code.Execution
Description
This indicates an attack attempt against a code-execution vulnerability in the Windows kernel component of GDI.
The vulnerability is a result of the application's failure to properly sanitize user input before passing it to the kernel component of Windows GDI. Successful exploitation could allow remote attackers to execute arbitrary code.
Affected Products
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 1
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista and Windows Vista Service Pack 1
Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1
Windows Server 2008 for 32-bit Systems*
Windows Server 2008 for x64-based Systems*
Windows Server 2008 for Itanium-based Systems
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the patch, available from the following web site.
http://www.microsoft.com/technet/security/Bulletin/ms09-006.mspx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |