Executive Summary
Summary | |
---|---|
Title | Vulnerability in MPEG |
Informations | |||
---|---|---|---|
Name | MS10-062 | First vendor Publication | 2010-09-14 |
Vendor | Microsoft | Last vendor Modification | 2010-09-14 |
Severity (Vendor) | Critical | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.0 (September 14, 2010): Bulletin published.Summary: This security update resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-062.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7318 | |||
Oval ID: | oval:org.mitre.oval:def:7318 | ||
Title: | MPEG-4 Codec Vulnerability | ||
Description: | The MPEG-4 codec in the Windows Media codecs in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 does not properly handle crafted media content with MPEG-4 video encoding, which allows remote attackers to execute arbitrary code via a file in an unspecified "supported format," aka "MPEG-4 Codec Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0818 | Version: | 6 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 4 | |
Os | 2 | |
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2010-09-15 | Name : MPEG-4 Codec Remote Code Execution Vulnerability (975558) File : nvt/secpod_ms10-062.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
67985 | Microsoft Windows MPEG-4 Codec Content Parsing Overflow Microsoft Windows contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is caused due to an unspecified error in the MPEG-4 version 1 codec when parsing certain media content. It can allow execution of arbitrary code |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-09-16 | IAVM : 2010-A-0122 - Microsoft MPEG Layer-4 Codec Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0025359 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Windows Media Player ASF file arbitrary code execution attempt RuleID : 17242 - Revision : 7 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-14 | Name : A video codec on the remote Windows host has a buffer overflow vulnerability. File : smb_nt_ms10-062.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:40 |
|
2014-01-19 21:30:31 |
|
2013-11-11 12:41:18 |
|