MS.DirectShow.QuickTime.Atom.Size.Memory.Corruption
Description
This indicates an attack attempt against a Code Execution vulnerability in Microsoft DirectShow.
The vulnerability is caused by an error when the vulnerable software handles a malicious .avi file. It allows a remote attacker to execute arbitrary code via sending a crafted .avi file.
Affected Products
Microsoft Windows 2000 Service Pack 4 with DirectX 7.0
DirectX 8.1
Microsoft Windows 2000 Service Pack 4 with DirectX 8.1
DirectX 9.0
Microsoft Windows 2000 Service Pack 4 with DirectX 9.0*
Windows XP Service Pack 2 and Windows XP Service Pack 3 with DirectX 9.0*
Windows XP Professional x64 Edition Service Pack 2 with DirectX 9.0*
Windows Server 2003 Service Pack 2 with DirectX 9.0*
Windows Server 2003 x64 Edition Service Pack 2 with DirectX 9.0*
Windows Server 2003 with SP2 for Itanium-based Systems with DirectX 9.0*
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patch, available from the web site:
http://www.microsoft.com/technet/security/Bulletin/ms09-028.mspx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |