Overview
Microsoft DirectX is vulnerable to a stack-based buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft DirectX is a feature of the Microsoft Windows operating system used for streaming multimedia content. DirectX integrates DirectShow technology to provide high-quality capture of streaming media such as video and audio. A stack-based buffer overflow exists due to DirectShow's improper parsing of Synchonized Accessible Media Interchange (SAMI) files. By successfully persuading a user to access a specially crafted SAMI file, a remote, unauthenticated attacker could trigger the buffer overflow. |
Impact
A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system. |
Solution
Microsoft has published Microsoft Security Bulletin MS07-064 in response to this issue. Users are strongly encouraged to review this bulletin and apply the referenced patches. |
In addition to the patches referenced above, Microsoft has published workarounds for this issue. Users who are unable to apply the patches are strongly encouraged to implement these workarounds as appropriate. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Microsoft credits Jun Mao of VeriSign iDefense Labs for reporting this vulnerability.
This document was written by Joseph W. Pruszynski.
Other Information
CVE IDs: | CVE-2007-3901 |
Severity Metric: | 7.25 |
Date Public: | 2007-12-11 |
Date First Published: | 2007-12-14 |
Date Last Updated: | 2007-12-14 16:17 UTC |
Document Revision: | 9 |