MS.DirectShow.biClrUsed.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt against a memory-corruption vulnerability in Microsoft DirectShow.
The vulnerability is caused by an error when the vulnerable software opens a malformed AVI file. It may allow remote attackers to execute arbitrary code by sending a crafted AVI file.

affected-products-logoAffected Products

AVI Filter on Microsoft Windows 2000 Service Pack 4
AVI Filter on Windows XP Service Pack 2 and Windows XP Service Pack 3
AVI Filter on Windows XP Professional x64 Edition Service Pack 2
AVI Filter on Windows Server 2003 Service Pack 2
AVI Filter on Windows Server 2003 x64 Edition Service Pack 2
AVI Filter on Windows Server 2003 with SP2 for Itanium-based Systems
Quartz
Quartz on Microsoft Windows 2000 Service Pack 4
Quartz on Windows XP Service Pack 2 and Windows XP Service Pack 3
Quartz on Windows XP Professional x64 Edition Service Pack 2
Quartz on Windows Server 2003 Service Pack 2
Quartz on Windows Server 2003 x64 Edition Service Pack 2
Quartz on Windows Server 2003 with SP2 for Itanium-based Systems
Quartz on Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Quartz on Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2
Quartz on Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**
Quartz on Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**
Quartz on Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
Quartz on Windows 7 for 32-bit Systems
Quartz on Windows 7 for x64-based Systems
Quartz on Windows Server 2008 R2 for x64-based Systems
Quartz on Windows Server 2008 R2 for Itanium-based Systems

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's web site for the suggested workaround:
http://www.microsoft.com/technet/security/Bulletin/ms10-013.mspx

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)