Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the "MJPEG Decoder Vulnerability."
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2008/1780 | vdb entry broken link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236 | vdb entry signature |
http://securitytracker.com/id?1020222 | vdb entry patch |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033 | vendor advisory |
http://www.us-cert.gov/cas/techalerts/TA08-162B.html | third party advisory us government resource |
http://marc.info/?l=bugtraq&m=121380194923597&w=2 | mailing list vendor advisory |
http://www.securityfocus.com/bid/29581 | vdb entry patch |
http://secunia.com/advisories/30579 | third party advisory patch vendor advisory |