Unknown
CVE-2004-0200
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
CVE-2004-0200
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- .net framework 1.0,
- digital image pro 7.0,
- digital image pro 9,
- digital image suite 9,
- excel 2002,
- excel 2003,
- frontpage 2002,
- frontpage 2003,
- greetings 2002,
- infopath 2003,
- office 2003,
- office xp,
- onenote 2003,
- outlook 2002,
- outlook 2003,
- picture it 2002,
- picture it 7.0,
- picture it 9,
- powerpoint 2002,
- powerpoint 2003,
- producer,
- project 2002,
- project 2003,
- publisher 2002,
- publisher 2003,
- visio 2002,
- visio 2003,
- visual basic 2002,
- visual basic 2003,
- visual c# 2002,
- visual c# 2003,
- visual c++ 2002,
- visual c++ 2003,
- visual j# .net 2003,
- visual studio .net 2002,
- visual studio .net 2003,
- windows 2003 server r2,
- windows xp,
- word 2002,
- word 2003
Weaknesses
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: