Executive Summary
Summary | |
---|---|
Title | Microsoft Windows Media Format Runtime ASF handling buffer overflow |
Informations | |||
---|---|---|---|
Name | VU#319385 | First vendor Publication | 2007-12-12 |
Vendor | VU-CERT | Last vendor Modification | 2007-12-13 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#319385Microsoft Windows Media Format Runtime ASF handling buffer overflowOverviewMicrosoft Windows Media Format Runtime is vulnerable to a heap-based buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on an vulnerable system.I. DescriptionMicrosoft Windows Media Format Runtime is used by various Windows Media applications such as Windows Media Player. The Windows Media Format Runtime includes the ability to play Advanced Systems Format (ASF) files, which can contain streaming audio, video, slide shows and synchronized events. A heap-based buffer overflow exists due to Microsoft Windows Media Format Runtime's improper parsing of ASF files. By successfully persuading a user to access a specially crafted ASF file, a remote, unauthenticated attacker could trigger the buffer overflow.II. ImpactA remote, unauthenticated attacker could execute arbitrary code on a vulnerable system.III. SolutionMicrosoft has published Microsoft Security Bulletin MS07-068 in response to this issue. Users are strongly encouraged to review this bulletin and apply the referenced patches.In addition to the patches referenced above, Microsoft has published workarounds for this issue. Users who are unable to apply the patches are strongly encouraged to implement these workarounds as appropriate.
References
Microsoft credits Ryan Smith of ISS X-Force for reporting this vulnerability. This document was written by Joseph W. Pruszynski.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/319385 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:3622 | |||
Oval ID: | oval:org.mitre.oval:def:3622 | ||
Title: | Windows Media Format Remote Code Execution Vulnerability | ||
Description: | Heap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-0064 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Windows Media Format Runtime 7.1 Windows Media Format Runtime 9.0 Windows Media Format Runtime 9.5 Windows Media Format Runtime 11 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-01-14 | Name : Vulnerability in Windows Media File Format Could Allow Remote Code Execution File : nvt/gb_ms07-068.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
39122 | Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution A buffer overflow exists in Windows. The Windows Media Player fails to validate ASF files resulting in a heap overflow. With a specially crafted file, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2007-12-13 | IAVM : 2007-A-0056 - Microsoft Windows Media File Format Vulnerability Severity : Category II - VMSKEY : V0015588 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows ASF parsing memory corruption attempt RuleID : 17711 - Revision : 13 - Type : OS-WINDOWS |
2014-01-10 | VMware Workstation DHCP service integer overflow attempt RuleID : 17662 - Revision : 13 - Type : SERVER-OTHER |
2014-01-10 | Microsoft Media Player asf streaming audio spread error correction data lengt... RuleID : 13160 - Revision : 9 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Media Player asf streaming format audio error masking integer overf... RuleID : 13159 - Revision : 8 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Media Player asf streaming format interchange data integer overflow... RuleID : 13158 - Revision : 8 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-12-11 | Name : Arbitrary code can be executed on the remote host through the Media File Format. File : smb_nt_ms07-068.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-05-08 13:28:01 |
|
2013-05-11 00:57:00 |
|