---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Microsoft DirectX Media SDK FlashPix ActiveX Control Buffer Overflow SECUNIA ADVISORY ID: SA26426 VERIFY ADVISORY: http://secunia.com/advisories/26426/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Microsoft DirectX Media SDK 6.x http://secunia.com/product/15264/ DESCRIPTION: Krystian Kloskowski has discovered a vulnerability in DirectX Media SDK, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in Live Picture Corporation's DXSurface.LivePicture.FLashPix.1 (DXTLIPI.DLL) ActiveX control when handling the "SourceUrl" property. This can be exploited to cause a buffer overflow by assigning an overly long (around 1044 bytes) string to the affected property. Successful exploitation allows execution of arbitrary code when e.g. a user visits a malicious website. The vulnerability is confirmed in DirectX Media SDK version 6.0 including DXTLIPI.DLL version 6.0.2.827. Other versions and applications that use the affected ActiveX control may also be affected. SOLUTION: Set the kill-bit for the affected ActiveX control. PROVIDED AND/OR DISCOVERED BY: Krystian Kloskowski ORIGINAL ADVISORY: http://www.milw0rm.com/exploits/4279 OTHER REFERENCES: US-CERT VU#466601: http://www.kb.cert.org/vuls/id/466601 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------