Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Security settings for graphic filters for Microsoft Office 365, Microsoft Office 2016, Microsoft Office 2013, Microsoft Office 2010, and the 2007 Microsoft Office system


View products that this article applies to.


Important This article contains information that shows you how to help lower security settings or how to turn off security features on a computer. You can make these changes to work around a specific problem. Before you make these changes, we recommend that you evaluate the risks that are associated with implementing this workaround in your particular environment. If you implement this workaround, take any appropriate additional steps to help protect the computer.

↑ Back to the top


Introduction

Beginning in Microsoft Security Advisory MS10-105, the security update that is described in the security advisory lets users and administrators control when and how Microsoft Office loads images in Office programs by setting the "Allow List" in the registry.

For more information about Microsoft Security Advisory MS10-105, click the following article number to go to the article in the Microsoft Knowledge Base:
968095 MS10-105: Vulnerability in Microsoft Office could allow for remote code execution
The security update applies to the Microsoft Access, Microsoft Excel, Microsoft FrontPage, Microsoft OneNote, Microsoft PowerPoint, Microsoft Publisher, and Microsoft Word programs that are listed in the "Applies to" section.

By default, the following graphic filters are enabled and do not require a registry subkey change after you apply the security update:

  • Bitmap (.bmp)
  • Graphics Interchange Format (.gif)
  • Joint Photographic Experts Group (.jpg, .jpeg)
  • Macintosh PICT (.pict)
  • Portable Network Graphics (.png)


↑ Back to the top


File information

Latest version numbers for the graphic filters

The following table lists the latest version numbers for the graphic filters together with the Microsoft Office versions to which they apply.

Note This table lists the English file versions only.

TypeDescriptionFile included in Office 2016 and Office 365File included in Office 2013File included in Office 2010File included in the 2007 Office system
BMPBMPIM32.FLT
CDRCDRIMP32.FLT
CGMCGMIMP32.FLT2010.1400.4740.10002006.1200.4518.1000
EPSEPSIMP32.FLT2012.1600.4309.10002012.1500.4420.10232010.1400.4740.10002006.1200.4518.1000
GIFGIFIMP32.FLT2012.1600.4266.10012012.1500.4420.1023
JPGJPEGIM32.FLT2012.1600.4333.10002012.1500.4420.1023
PCDPCDIMP32.FLT
PICTPICTIM32.FLT2012.1600.4266.10012012.1500.4420.10232010.1400.4740.10002006.1200.4518.1000
PNGPNG32.FLT2012.1600.4333.10002012.1500.4420.1023
WPGWPGIMP32.FLT2012.1600.4266.10012012.1500.4420.10232010.1400.4740.10002006.1200.4518.1000
FPXFPX32.FLT
PCDPCDIMP32.FLT
PCXPCXIMP32.FLT
TIFFTIFFIM32.FLT
WMFWMFIMP32.FLT

↑ Back to the top


More Information

How to enable the graphics filter "Allow List"

Warning This workaround may make a computer or a network more vulnerable to attack by malicious users or by malicious software such as viruses. We do not recommend this workaround, but we are providing this information so that you can implement this workaround at your own discretion. Use this workaround at your own risk.

The "Allow List" and the enabled graphic filters can be set manually for a single computer or by using a Group Policy setting.

The graphic filters that you have to enable must be added to the following registry subkeys:

For a single computer:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common\Security\AllowLists\GraphicsFilterImport

For a single computer that is running a 64-bit operating system:

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\Common\Security\AllowLists\GraphicsFilterImport

For a Group Policy setting:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Office\Common\Security\AllowLists\GraphicsFilterImport

To enable the "Allow List" for graphic filters, the AllowListEnabled value must be set to 1. To disable the "Allow List," the AllowListEnabled value must be set to 0.

Note If the AllowListEnabled value does not exist, you must create it as a REG_DWORD type.

When the AllowListEnabled value is enabled, you can specify the list of graphic filters to enable by adding the graphic filters as a string value that has the name FILTER.FLT (where FILTER.FLT is replaced by the actual name of the filter) together with the version number of the filter. The filter version number must use the following format:
XXXX.YYYY.ZZZZ.WWWW

Note When you set the AllowListEnabled value to 1, the default list of enabled graphic filters is removed. To re-enable the default graphic filters and add the CGMIMP32.FLT graphic filter, you must specify the filters in the "Allow List."

The following table shows an example of the "Allow List":

NameTypeData
(Default)REG_SZ(value not set)
AllowListEnabledREG_DWORD0x00000001 (1)
EPSIMP32.FLTREG_SZ2012.1600.4309.1000
GIFIMP32.FLTREG_SZ2012.1600.4266.1001
JPEGIM32.FLTREG_SZ2012.1600.4333.1000
PICTIM32.FLTREG_SZ2012.1600.4266.1001
PNG32.FLTREG_SZ2012.1600.4333.1000

↑ Back to the top


Keywords: kb, consumeroff2010track, kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbmustloc, kblangall, kbfix, kbexpertiseinter, kbbug

↑ Back to the top

Article Info
Article ID : 2479871
Revision : 9
Created on : 4/12/2017
Published on : 4/13/2017
Exists online : False
Views : 615