Vulnerabilities > CVE-2010-0028 - Numeric Errors vulnerability in Microsoft Windows 2000, Windows Server 2003 and Windows XP

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
CWE-189
critical
nessus
exploit available

Summary

Integer overflow in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted JPEG (.JPG) file, aka "MS Paint Integer Overflow Vulnerability."

Vulnerable Configurations

Part Description Count
OS
Microsoft
5

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionMicrosoft Paint Integer Overflow Vulnerability (DoS) MS10-005. CVE-2010-0028. Dos exploit for windows platform
idEDB-ID:12518
last seen2016-02-01
modified2010-05-06
published2010-05-06
reporterunsign
sourcehttps://www.exploit-db.com/download/12518/
titleMicrosoft Paint Integer Overflow Vulnerability DoS MS10-005

Msbulletin

bulletin_idMS10-005
bulletin_url
date2010-02-09T00:00:00
impactRemote Code Execution
knowledgebase_id978706
knowledgebase_url
severityModerate
titleVulnerability in Microsoft Paint Could Allow Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS10-005.NASL
descriptionThe remote Windows host is running a version of Microsoft Paint that has an integer overflow vulnerability that can be triggered when decoding JPEG images. If an attacker can trick a user on the affected host into opening a specially crafted JPEG image file using Microsoft Paint, he may be able to leverage these issues to execute arbitrary code subject to the user
last seen2020-06-01
modified2020-06-02
plugin id44415
published2010-02-09
reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/44415
titleMS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution (978706)
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(44415);
  script_version("1.22");
  script_cvs_date("Date: 2018/11/15 20:50:30");

  script_cve_id("CVE-2010-0028");
  script_bugtraq_id(38042);
  script_xref(name:"MSFT", value:"MS10-005");
  script_xref(name:"IAVB", value:"2010-B-0014");
  script_xref(name:"MSKB", value:"978706");

  script_name(english:"MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution (978706)");
  script_summary(english:"Checks version of MSPaint.exe");

  script_set_attribute(
    attribute:"synopsis",
    value:
"Arbitrary code can be executed on the remote host through Microsoft
Paint."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Windows host is running a version of Microsoft Paint that
has an integer overflow vulnerability that can be triggered when
decoding JPEG images.

If an attacker can trick a user on the affected host into opening a
specially crafted JPEG image file using Microsoft Paint, he may be
able to leverage these issues to execute arbitrary code subject to the
user's privileges."
  );
  script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-005");
  script_set_attribute(
    attribute:"solution",
    value:
"Microsoft has released a set of patches for Windows 2000, XP, and
2003."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(189);

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/02/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/02/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/02/09");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows : Microsoft Bulletins");

  script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
  script_require_keys("SMB/MS_Bulletin_Checks/Possible");
  script_require_ports(139, 445, 'Host/patch_management_checks');

  exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS10-005';
kbs = make_list("978706");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(win2k:'4,5', xp:'2,3', win2003:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

kb = "978706";

if (
  # Windows 2003 / XP x64
  hotfix_is_vulnerable(os:"5.2", sp:2,             file:"Mspaint.exe", version:"5.2.3790.4638", dir:"\system32", bulletin:bulletin, kb:kb) ||

  # Windows XP x86
  hotfix_is_vulnerable(os:"5.1", sp:3, arch:"x86", file:"Mspaint.exe", version:"5.1.2600.5918", dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"5.1", sp:2, arch:"x86", file:"Mspaint.exe", version:"5.1.2600.3660", dir:"\system32", bulletin:bulletin, kb:kb) ||

  # Windows 2000
  hotfix_is_vulnerable(os:"5.0",                   file:"Mspaint.exe", version:"5.0.2195.7368", dir:"\system32", bulletin:bulletin, kb:kb)
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

accepted2010-03-22T04:00:14.300-04:00
classvulnerability
contributors
nameDragos Prisaca
organizationSymantec Corporation
definition_extensions
  • commentMicrosoft Windows 2000 SP4 or later is installed
    ovaloval:org.mitre.oval:def:229
  • commentMicrosoft Windows XP (x86) SP2 is installed
    ovaloval:org.mitre.oval:def:754
  • commentMicrosoft Windows XP (x86) SP3 is installed
    ovaloval:org.mitre.oval:def:5631
  • commentMicrosoft Windows XP x64 Edition SP2 is installed
    ovaloval:org.mitre.oval:def:4193
  • commentMicrosoft Windows Server 2003 SP2 (x64) is installed
    ovaloval:org.mitre.oval:def:2161
  • commentMicrosoft Windows Server 2003 SP2 (x86) is installed
    ovaloval:org.mitre.oval:def:1935
  • commentMicrosoft Windows Server 2003 (ia64) SP2 is installed
    ovaloval:org.mitre.oval:def:1442
descriptionInteger overflow in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted JPEG (.JPG) file, aka "MS Paint Integer Overflow Vulnerability."
familywindows
idoval:org.mitre.oval:def:8429
statusaccepted
submitted2010-02-08T13:00:00
titleMS Paint Integer Overflow Vulnerability
version69

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/89244/mspaint-dos.txt
idPACKETSTORM:89244
last seen2016-12-05
published2010-05-07
reporterunsign
sourcehttps://packetstormsecurity.com/files/89244/Microsoft-Paint-Integer-Overflow-Denial-Of-Service.html
titleMicrosoft Paint Integer Overflow Denial Of Service

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 38042 CVE ID: CVE-2010-0028 画图是Windows操作系统中默认捆绑的图形编辑软件。 画图工具在解码JPEG图形时存在可导致堆溢出的整数溢出漏洞,用户受骗打开了特制的JPEG图形文件就会导致执行任意代码。成功利用此漏洞的攻击者便可完全控制受影响的系统。 Microsoft Windows XP SP3 Microsoft Windows XP SP2 Microsoft Windows Server 2003 SP2 Microsoft Windows 2000SP4 临时解决方法: * 禁用或删除画图工具。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS10-005)以及相应补丁: MS10-005:Vulnerability in Microsoft Paint Could Allow Remote Code Execution (978706) 链接:http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx?pf=true
idSSV:19139
last seen2017-11-19
modified2010-02-20
published2010-02-20
reporterRoot
titleMicrosoft画图工具JPEG图形处理整数溢出溢出漏洞(MS10-005)