Executive Summary:
This update resolves a newly-discovered, privately reported vulnerability. A buffer overrun vulnerability exists in the processing of JPEG image formats that could allow remote code execution on an affected system. The vulnerability is documented in this bulletin in its own section.
If a user is logged on with administrator privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.
Microsoft recommends that customers apply the update immediately.
function | description | safer alternative | description |
---|---|---|---|
gets | read from stdin until '\0' or '\n' and place in buffer | fgets | can specify maximum length of string to be placed in buffer |
strcpy | copy from one buffer to another (up to '\0') | strncpy | specify max amount of data to be copied |
strcat(dest, src) | copy characters in src to the end of dest | strncat | only the first n characters of src are appended |
sprintf | format contents of one buffer and place in another buffer | snprintf | size of destination buffer is specified |
scanf | read formatted input from stdin, dangerous if used with an unbounded specifier like %s | scanf with bounded format specifier |
used with bounded size format specifiers is ok |