Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-0038Sensitive Information Exposure in Corporation Windows Graphics Component

Severity
5.5MEDIUMNVD
CNA4.3
EPSS
80.5%
top 0.87%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 20
Latest updateMay 17

Description

gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5microsoft_corporation/windows_graphics_componentThe Graphics Device Interface (GDI) component in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607
NVDmicrosoft/windows_101511, 1607+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hv82-656f-m543: gdi322022-05-17
CVEList
CVE-2017-0038: gdi322017-02-20

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - 'gdi32.dll' EMR_SETDIBITSTODEVICE Heap Out-of-Bounds Reads / Memory Disclosure2017-02-15

📋Vendor Advisories

1
Microsoft
Windows GDI Information Disclosure Vulnerability2017-03-14
CVE-2017-0038 — Sensitive Information Exposure | cvebase