Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka βWindows Shell Graphics Processing Overrun Vulnerability.β
blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
secunia.com/advisories/42779
www.kb.cert.org/vuls/id/106516
www.metasploit.com/redmine/projects/framework/repository/revisions/11466/entry/modules/exploits/windows/fileformat/ms11_xxx_createsizeddibsection.rb
www.microsoft.com/technet/security/advisory/2490606.mspx
www.powerofcommunity.net/speaker.html
www.securityfocus.com/bid/45662
www.securitytracker.com/id?1024932
www.vupen.com/english/advisories/2011/0018
docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11671