Windows GDI Interface Buffer Overflow Vulnerability

  • Thread starter Thread starter koc
  • Start date Start date
K

koc

Our security reporter send us a mail about Windows GDI Interface Buffer
Overflow Vulnerability in last mounth.There isn't any patch for this
vulnerability .But a workaround solve this security problem according to my
reporter.This workaround is :

Turn off metafile processing by modifying the registry.
Under registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\GRE_Initialize
create a DWORD entry "DisableMetaFiles" and set it to 1.


Can you tell me this workaround is true and trustable ? and what do you
think about this security vulnerability? Thanks
Also I am located in Turkey
 
Our security reporter send us a mail about Windows GDI
Interface Buffer Overflow Vulnerability in last
mounth.There isn't any patch for this vulnerability .But a
workaround solve this security problem according to my
reporter.This workaround is :

Turn off metafile processing by modifying the registry.
Under registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\GRE_Initialize
create a DWORD entry "DisableMetaFiles" and set it to 1.


Can you tell me this workaround is true and trustable ? and
what do you think about this security vulnerability? Thanks
Also I am located in Turkey

See [wraps]:
http://www.microsoft.com/technet/security/bulletin/ms07-
046.mspx

J
 
Back
Top