Microsoft KB Archive/256167

From BetaArchive Wiki
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
Knowledge Base

CG5: Clip Art Buffer Overrun Vulnerability Patch

Article ID: 256167

Article Last Modified on 9/11/2002


  • Microsoft Clip Gallery 5.0

This article was previously published under Q256167


Microsoft has developed a patch for avoiding a possible buffer overrun in Microsoft Clip Gallery. The buffer overrun could cause Clip Gallery 5.0 to stop responding (crash), or allow arbitrary code to run on your computer. A malicious user could embed this arbitrary code in a file that Clip Gallery 5.0 downloads to your computer. This code could be harmful, damaging information stored on the computer.

NOTE: If you do not have Clip Gallery 5.0 installed on your computer, then you do not need to use the Clip Gallery Buffer Overrun Patch.


Microsoft Clip Gallery allows you to download additional clip art from Microsoft Design Gallery Live and the Web sites of our associated partners. This functionality includes the automatic installation of the downloaded clip art on your computer. Clip Gallery and Design Gallery Live use a special file format for downloading these clips, called the .CIL format. Under certain circumstances, a very long field embedded in a clip art .CIL file could cause a buffer overrun in the Clip Gallery software. When the buffer overrun occurs, the software could crash or cause arbitrary code to run on your computer.

The primary danger in this vulnerability is that the buffer overrun may occur when you open an attachment that includes a maliciously formed clip art file, or when you download a .CIL file from a malicious user's Web page.

For example, you go to a Web site that contains groups of clip art - saved in the .CIL format - for Office 2000, Works 2000, Picture It! 2000, Home Publisher 2000, or PhotoDraw 2000 Version 1. You believe these are legitimate download pages, and you download one of these .CIL files to use in Picture It! 2000. The instructions on the page tell you to double-click the file to open it in Clip Gallery. However, the person who made the Web site has embedded malicious code that deletes data on your hard disk. To make the malicious code run, the person also includes a very long field in the .CIL file. When you double-click the file to open it in Clip Gallery, Clip Gallery has a buffer overrun, and then the malicious code runs. Because Clip Gallery does not prompt you for confirmation, this vulnerability still affects you even if you follow safe computing practices, such as using virus detection software.

You can download the update file from the following location:

Follow the instructions on this page to install the Clip Art Buffer Overrun Vulnerability Patch.

You can obtain support for the tool through the support offering for your product listed in the product's Help file.

Additional query words: execute crash crashes crashing crashed quit quitting quits fail fails failing failed break

Keywords: kbinfo KB256167