Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in DirectX Could Allow Remote Code Execution (951698) |
Informations | |||
---|---|---|---|
Name | MS08-033 | First vendor Publication | 2008-06-10 |
Vendor | Microsoft | Last vendor Modification | 2008-08-12 |
Severity (Vendor) | Critical | Revision | 2.1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V2.1 (August 12, 2008): Added known issues link. Also added an entry to the section, Frequently Asked Questions (FAQ) Related to this Security Update, about the known issues and solutions. The solutions include a change to Microsoft Baseline Security Analyzer (MBSA) 2.1 to correctly detect this update.Summary: This security update resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS08-033.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5236 | |||
Oval ID: | oval:org.mitre.oval:def:5236 | ||
Title: | MJPEG Decoder Vulnerability | ||
Description: | Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the "MJPEG Decoder Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-0011 | Version: | 11 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | DirectX |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5562 | |||
Oval ID: | oval:org.mitre.oval:def:5562 | ||
Title: | SAMI Format Parsing Vulnerability | ||
Description: | Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the "SAMI Format Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-1444 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 | Product(s): | DirectX |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-30 | Name : Vulnerabilities in DirectX Could Allow Remote Code Execution (951698) File : nvt/gb_ms08-033.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
46065 | Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution |
46064 | Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Microsoft Windows DirectX malformed mjpeg arbitrary code execution attempt RuleID : 37153 - Revision : 1 - Type : FILE-MULTIMEDIA |
2016-03-14 | Microsoft Windows DirectX malformed mjpeg arbitrary code execution attempt RuleID : 37152 - Revision : 1 - Type : FILE-MULTIMEDIA |
2016-03-14 | Microsoft Windows DirectX malformed mjpeg arbitrary code execution attempt RuleID : 37151 - Revision : 1 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows DirectX malformed mjpeg arbitrary code execution attempt RuleID : 15995 - Revision : 16 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows DirectX malformed mjpeg arbitrary code execution attempt RuleID : 13824 - Revision : 15 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows DirectX SAMI file parsing buffer overflow attempt RuleID : 13823 - Revision : 14 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-06-10 | Name : A vulnerability in DirectX could allow remote code execution. File : smb_nt_ms08-033.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:59 |
|
2014-01-19 21:30:12 |
|
2013-05-11 00:49:20 |
|