Windows GDI Interface Buffer Overflow Vulnerability

K

koc

Our security reporter send us a mail about Windows GDI Interface Buffer
Overflow Vulnerability in last mounth.There isn't any patch for this
vulnerability .But a workaround solve this security problem according to my
reporter.This workaround is :

Turn off metafile processing by modifying the registry.
Under registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\GRE_Initialize
create a DWORD entry "DisableMetaFiles" and set it to 1.


Can you tell me this workaround is true and trustable ? and what do you
think about this security vulnerability? Thanks
Also I am located in Turkey
 
M

me

Our security reporter send us a mail about Windows GDI
Interface Buffer Overflow Vulnerability in last
mounth.There isn't any patch for this vulnerability .But a
workaround solve this security problem according to my
reporter.This workaround is :

Turn off metafile processing by modifying the registry.
Under registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\GRE_Initialize
create a DWORD entry "DisableMetaFiles" and set it to 1.


Can you tell me this workaround is true and trustable ? and
what do you think about this security vulnerability? Thanks
Also I am located in Turkey

See [wraps]:
http://www.microsoft.com/technet/security/bulletin/ms07-
046.mspx

J
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top