header-logo
Suggest Exploit
vendor:
Clip Art Gallery
by:
SecurityFocus
7,5
CVSS
HIGH
Microsoft Clip Art Gallery
119
CWE
Product Name: Clip Art Gallery
Affected Version From: Microsoft Clip Art Gallery
Affected Version To: Microsoft Clip Art Gallery
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

Microsoft Clip Art Gallery

A vulnerability exists within the Microsoft Clip Art Gallery, where a remote user can crash the Clip Art application or possibly execute arbitrary code. Clip art can be downloaded from any website and incorporated into the local gallery. A particular file format called .CIL is used in order to transport new clip art files to the users. The vulnerability is that a user may open a malformed .CIL file containing a long embedded field downloaded from a malicious third-party website or in the form of an email attachment regardless of it's origin.

Mitigation:

Users should be cautious when downloading and opening files from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1034/info

A vulnerability exists within the Microsoft Clip Art Gallery, where a remote user can crash the Clip Art application or possibly execute arbitrary code.

Clip art can be downloaded from any website and incorporated into the local gallery. A particular file format called .CIL is used in order to transport new clip art files to the users. The vulnerability is that a user may open a malformed .CIL file containing a long embedded field downloaded from a malicious third-party website or in the form of an email attachment regardless of it's origin.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19789.bad