Lucene search

K
saintSAINT CorporationSAINT:994219A13928204F81FD5B117C50DF62
HistoryJun 03, 2009 - 12:00 a.m.

Microsoft DirectX DirectShow QuickTime movie parsing vulnerability

2009-06-0300:00:00
SAINT Corporation
download.saintcorporation.com
18

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.739 High

EPSS

Percentile

98.1%

Added: 06/03/2009
CVE: CVE-2009-1537
BID: 35139
OSVDB: 54797

Background

DirectX is a feature of the Windows operating system used for streaming media. Within DirectX, the DirectShow technology performs client-side audio and video sourcing, manipulation and rendering.

Problem

A command execution vulnerability in DirectShow allows command execution when a user opens a QuickTime movie file containing an invalid compressor name length value in the STSD atom.

Resolution

Apply one of the workarounds described in Microsoft Security advisory 971778.

References

<http://isc.sans.org/diary.html?storyid=6481&gt;

Limitations

Exploit works on Microsoft DirectX 9.0 and requires a user to open the exploit page in Internet Explorer 6 or 7.

The .NET framework 2.0 must be installed on the target.

Platforms

Windows XP

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.739 High

EPSS

Percentile

98.1%