7.5
CVSSv2

CVE-2005-4560

Published: 28/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote malicious users to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2003 server standard

microsoft windows 2003 server web

microsoft windows xp

microsoft windows 2003 server enterprise

microsoft windows 2003 server r2

Vendor Advisories

Debian Bug report logs - #346197 [CVE-2006-0106] Wine is vulnerable to SetAbortProc WMF bug Package: wine; Maintainer for wine is Debian Wine Party <debian-wine@listsdebianorg>; Source for wine is src:wine (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Fri, 6 Jan 2006 10:18:01 UTC Seve ...

Exploits

## # $Id: ms06_001_wmf_setabortprocrb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/co ...

References

CWE-20http://www.f-secure.com/weblog/archives/archive-122005.html#00000753http://vil.mcafeesecurity.com/vil/content/v_137760.htmhttp://www.kb.cert.org/vuls/id/181038http://www.securityfocus.com/bid/16074http://secunia.com/advisories/18255http://www.microsoft.com/technet/security/advisory/912840.mspxhttp://securitytracker.com/id?1015416http://linuxbox.org/pipermail/funsec/2006-January/002455.htmlhttp://www.us-cert.gov/cas/techalerts/TA05-362A.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-005A.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2006-001.htmhttp://secunia.com/advisories/18364http://secunia.com/advisories/18311http://secunia.com/advisories/18415http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375341http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420http://www.vupen.com/english/advisories/2005/3086https://exchange.xforce.ibmcloud.com/vulnerabilities/23846https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1612https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1564https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1492https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1460https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1433https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1431https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-001http://www.securityfocus.com/archive/1/420773/100/0/threadedhttp://www.securityfocus.com/archive/1/420687/100/0/threadedhttp://www.securityfocus.com/archive/1/420684/100/0/threadedhttp://www.securityfocus.com/archive/1/420682/100/0/threadedhttp://www.securityfocus.com/archive/1/420664/30/7730/threadedhttp://www.securityfocus.com/archive/1/420546/30/7730/threadedhttp://www.securityfocus.com/archive/1/420446/100/0/threadedhttp://www.securityfocus.com/archive/1/420378/100/0/threadedhttp://www.securityfocus.com/archive/1/420367/100/0/threadedhttp://www.securityfocus.com/archive/1/420357/100/0/threadedhttp://www.securityfocus.com/archive/1/420351/100/0/threadedhttp://www.securityfocus.com/archive/1/420288/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346197https://nvd.nist.govhttps://www.exploit-db.com/exploits/16612/https://www.kb.cert.org/vuls/id/181038