Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-1539 | First vendor Publication | 2009-07-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DirectX Size Validation Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1539 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6341 | |||
Oval ID: | oval:org.mitre.oval:def:6341 | ||
Title: | DirectX Size Validation Vulnerability | ||
Description: | The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DirectX Size Validation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1539 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | DirectX |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Os | 1 | |
Os | 1 | |
Os | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2009-07-15 | Name : Microsoft DirectShow Remote Code Execution Vulnerability (961373) File : nvt/secpod_ms09-028.nasl |
2009-06-01 | Name : Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution File : nvt/secpod_ms_directx_code_exec_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
55845 | Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memor... Microsoft Windows DirectDraw contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when Internet Explorer renders a malicious web page. It is possible that the flaw may allow arbitrary code execution resulting in a loss of confidentiality and/or availability. |
Snort® IPS/IDS
Date | Description |
---|---|
2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51557 - Revision : 1 - Type : OS-WINDOWS |
2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51556 - Revision : 1 - Type : OS-WINDOWS |
2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51555 - Revision : 1 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows AVI DirectShow QuickTime parsing overflow attempt RuleID : 23565 - Revision : 4 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows DirectShow QuickTime file stsc atom parsing heap corruption... RuleID : 15682 - Revision : 16 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 15680 - Revision : 9 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows AVI DirectShow QuickTime parsing overflow attempt RuleID : 15517 - Revision : 18 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-07-14 | Name : It is possible to execute arbitrary code on the remote Windows host using Dir... File : smb_nt_ms09-028.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:10:51 |
|
2024-11-28 12:18:53 |
|
2020-05-23 00:23:44 |
|
2019-02-26 17:19:31 |
|
2018-10-13 00:22:49 |
|
2017-09-29 09:24:12 |
|
2016-06-28 17:40:50 |
|
2016-04-26 18:48:15 |
|
2014-02-17 10:49:55 |
|
2014-01-19 21:25:53 |
|
2013-05-10 23:49:48 |
|