The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 performs updates to pointers without properly validating unspecified data values, which allows remote attackers to execute arbitrary code via a crafted QuickTime media file, aka "DirectX Pointer Validation Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5963 | vdb entry signature |
http://osvdb.org/55844 | vdb entry |
http://www.vupen.com/english/advisories/2009/1886 | vdb entry |
http://www.securityfocus.com/bid/35600 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA09-195A.html | third party advisory us government resource |