Overview
Microsoft DirectX is vulnerable to a remote code execution vulnerability which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft DirectX is a feature of the Microsoft Windows operating system used for streaming multimedia content. DirectX integrates DirectShow technology to provide high-quality capture of streaming media such as video and audio. A stack-based buffer overflow exists due to DirectShow's improper parsing of WAV and AVI files. By successfully persuading a user to access a specially crafted WAV or AVI file, a remote, unauthenticated attacker could trigger the buffer overflow. |
Impact
A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system. |
Solution
Microsoft has published Microsoft Security Bulletin MS07-064 in response to this issue. Users are strongly encouraged to review this bulletin and apply the referenced patches. |
In addition to the patches referenced above, Microsoft has published workarounds for this issue. Users who are unable to apply the patches are strongly encouraged to implement these workarounds as appropriate. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Microsoft credits Peter Winter-Smith of NGSSoftware for reporting this vulnerability.
This document was written by Joseph W. Pruszynski.
Other Information
CVE IDs: | CVE-2007-3895 |
Severity Metric: | 7.25 |
Date Public: | 2007-12-11 |
Date First Published: | 2007-12-14 |
Date Last Updated: | 2007-12-14 16:20 UTC |
Document Revision: | 5 |