Executive Summary
Summary | |
---|---|
Title | Microsoft DirectX Media 6.0 Live Picture Corporation DirectTransform FlashPix ActiveX control buffer overflow |
Informations | |||
---|---|---|---|
Name | VU#466601 | First vendor Publication | 2007-08-12 |
Vendor | VU-CERT | Last vendor Modification | 2007-08-13 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#466601Microsoft DirectX Media 6.0 Live Picture Corporation DirectTransform FlashPix ActiveX control buffer overflowOverviewThe Live Picture Corporation DirectTransform FlashPix ActiveX control contains a buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.I. DescriptionThe Microsoft DirectX Media 6.0 SDK includes an ActiveX control that is produced by Live Picture Corporation. This control, which is provided by DXTLIPI.DLL, is known as FlashPix. The FlashPix ActiveX control contains a buffer overflow vulnerability in the SourceUrl() property. Because the FlashPix ActiveX control is marked "Safe for Scripting," Internet Explorer can be used as an attack vector for this vulnerability.Note that software other than the Microsoft DirectX Media 6.0 SDK may include the vulnerable FlashPix ActiveX control. Exploit code for this vulnerability is publicly available.
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{201EA564-A6F6-11D1-811D-00C04FB6BD36}] "Compatibility Flags"=dword:00000400 Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document. Systems Affected
Referenceshttp://www.cert.org/tech_tips/securing_browser/#Internet_Explorer This vulnerability was publicly disclosed by Krystian Kloskowski. This document was written by Will Dormann.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/466601 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
36399 | Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft DirectX Media SDK ActiveX function call unicode access RuleID : 12260 - Revision : 5 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft DirectX Media SDK ActiveX function call access RuleID : 12259 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft DirectX Media SDK ActiveX clsid unicode access RuleID : 12258 - Revision : 5 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft DirectX Media SDK ActiveX clsid access RuleID : 12257 - Revision : 9 - Type : BROWSER-PLUGINS |
Alert History
Date | Informations |
---|---|
2016-04-26 18:26:52 |
|