This is a vulnerability that is often used online, and the website of several major anti-virus manufacturers has been introduced. Because the corresponding version of ExPlOit is more, this vulnerability threshold is reduced, as long as you will use the write tool. The vulnerability is full: "Microsoft Windows GDI JPG Resolution Component Buffer Overflow Vulnerability", (Microsoft Windows Graphics Device Interface (GDI ) is an API, GDI (GDIPLUS.DLL) to display information on the screen and printer in processing malformation JPEG There is a buffer overflow when the file is displayed. The remote attacker can use this vulnerability component malicious JPEG file to execute any instructions on the system in the system, and pay attention to the third-party application, as long as the components affected by this vulnerability are installed. Any application uses gdiplus.dll to process the JPEG image, which will be attacked. Remote attackers can use this vulnerability. Sans launched a JPG vulnerability scan tool, http: // http: // ISC .s.org / gdiscan.php, the program automatically scans the DLL file with a vulnerability.