x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Encyclopedia GetVirusCard True 0

MS10-043

 
Threat LevelLow threatDamageHighDistributionNot widespread
Type:Vulnerability
Affected platforms:

Other

worm, vulnerability in the Canonical Display Driver on Windows 2008/7 computers, which allows arbitrary code to be remotely executed in the vulnerable computer.

The Canonical Display Driver (cdd.dll) is used by desktop composition to blend GDI and DirectX drawing. CDD emulates the interface of a Windows XP display driver for interactions with the Win32k GDI graphics engine. GDI enables applications to use graphics and formatted text on both the video display and the printer.

If exploited successfully, MS10-043 allows hackers to gain remote control of the affected computer with the same privileges as the logged on user. If this user had administrator rights, the hacker could take complete control of the system: create, modify or delete files, install programs, create new user accounts, etc.

This vulnerability is exploited by creating a specially crafted image file, hosting it in a web page and convincing users to access it. The link to the malicious website can be distributed through different means, like email messages or instant messages, among others.

 

If you have a Windows 2008/7 computer, it is recommended to download and apply the security patch for this vulnerability. Click here to access the web page for downloading the patch.