Lucene search

K
saintSAINT CorporationSAINT:70E767DEA8DC583FEC56E44FD8485388
HistoryJun 03, 2009 - 12:00 a.m.

Microsoft DirectX DirectShow QuickTime movie parsing vulnerability

2009-06-0300:00:00
SAINT Corporation
download.saintcorporation.com
6

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.739 High

EPSS

Percentile

98.1%

Added: 06/03/2009
CVE: CVE-2009-1537
BID: 35139
OSVDB: 54797

Background

DirectX is a feature of the Windows operating system used for streaming media. Within DirectX, the DirectShow technology performs client-side audio and video sourcing, manipulation and rendering.

Problem

A command execution vulnerability in DirectShow allows command execution when a user opens a QuickTime movie file containing an invalid compressor name length value in the STSD atom.

Resolution

Apply one of the workarounds described in Microsoft Security advisory 971778.

References

<http://isc.sans.org/diary.html?storyid=6481&gt;

Limitations

Exploit works on Microsoft DirectX 9.0 and requires a user to open the exploit page in Internet Explorer 6 or 7.

The .NET framework 2.0 must be installed on the target.

Platforms

Windows XP

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.739 High

EPSS

Percentile

98.1%