Heap-based buffer overflow in Microsoft Windows Help winhlp32.exe allows user-assisted attackers to execute arbitrary code via crafted embedded image data in a .hlp file.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_2000 | Microsoft | * | * |
Windows_2003_server | Microsoft | enterprise (including) | enterprise (including) |
Windows_2003_server | Microsoft | enterprise-sp1 (including) | enterprise-sp1 (including) |
Windows_2003_server | Microsoft | r2 (including) | r2 (including) |
Windows_2003_server | Microsoft | r2-sp1 (including) | r2-sp1 (including) |
Windows_2003_server | Microsoft | standard (including) | standard (including) |
Windows_2003_server | Microsoft | standard-sp1 (including) | standard-sp1 (including) |
Windows_2003_server | Microsoft | web (including) | web (including) |
Windows_2003_server | Microsoft | web-sp1 (including) | web-sp1 (including) |
Windows_nt | Microsoft | 4.0 (including) | 4.0 (including) |
Windows_nt | Microsoft | 4.0-sp1 (including) | 4.0-sp1 (including) |
Windows_nt | Microsoft | 4.0-sp2 (including) | 4.0-sp2 (including) |
Windows_nt | Microsoft | 4.0-sp3 (including) | 4.0-sp3 (including) |
Windows_nt | Microsoft | 4.0-sp4 (including) | 4.0-sp4 (including) |
Windows_nt | Microsoft | 4.0-sp5 (including) | 4.0-sp5 (including) |
Windows_nt | Microsoft | 4.0-sp6 (including) | 4.0-sp6 (including) |
Windows_nt | Microsoft | 4.0-sp6a (including) | 4.0-sp6a (including) |
Windows_xp | Microsoft | * | * |