CERT-In Vulnerability Note
CIVN-2007-0152
Microsoft DirectX SAMI/WAV/AVI File Parsing Vulnerabilities
Original Issue Date:December 12, 2007
Severity Rating: HIGH
Systems Affected
- Microsoft DirectX 7.x
- Microsoft DirectX 8.x
- Microsoft DirectX 9.x
- Microsoft DirectX 10.x
Overview
Two vulnerabilities have been reported in Microsoft DirectX that could be exploited by an attacker to take complete control of the vulnerable system.
Description
Microsoft DirectX Direct eXtension is a collection of application programming interfaces for handling tasks related to multimedia, especially game programming and video.
Microsoft DirectShow is used for streaming media on Microsoft Windows operating systems. DirectShow is used for high-quality capture and playback of multimedia streams
Microsoft DirectX Code Execution Vulnerability Parsing SAMI Files
(
CVE-2007-3901
)
The vulnerability is caused due to insufficient parsing of the parameters of Synchronized Accessible Media Interchange SAMI file types by Microsoft DirectShow.
Microsoft DirectX Code Execution Vulnerability Parsing WAV and AVI Files
(
CVE-2007-3895
)
The vulnerability is caused due to insufficient validation of the parameters of WAV and AVI file types by Microsoft DirectShow.
An attacker could exploit this vulnerability by creating a specially crafted format file. Opening this crafted file could corrupt the system memory. Successful exploitation allows attacker to execute arbitrary code with the privileges of logged in user.
Workaround
Modify the Access Control List for quartz.dll
Unregister the quartz.dll
Do not open wav and avi files received from untrusted sources.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS07-064
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS07-064.mspx
References
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS07-064.mspx
Secunia
http://secunia.com/advisories/28010/
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|