---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Microsoft DirectX MJPEG/SAMI File Processing Vulnerabilities SECUNIA ADVISORY ID: SA30579 VERIFY ADVISORY: http://secunia.com/advisories/30579/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ Microsoft Windows XP Home Edition http://secunia.com/product/16/ Microsoft Windows Vista http://secunia.com/product/13223/ Microsoft Windows Server 2008 http://secunia.com/product/18255/ Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/ Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/ Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/ Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/ Microsoft Windows 2000 Server http://secunia.com/product/20/ Microsoft Windows 2000 Professional http://secunia.com/product/1/ Microsoft Windows 2000 Datacenter Server http://secunia.com/product/1177/ Microsoft Windows 2000 Advanced Server http://secunia.com/product/21/ SOFTWARE: Microsoft DirectX 9.x http://secunia.com/product/1915/ Microsoft DirectX 8.x http://secunia.com/product/1914/ Microsoft DirectX 7.x http://secunia.com/product/1913/ Microsoft DirectX 10.x http://secunia.com/product/16896/ DESCRIPTION: Two vulnerabilities have been reported in Microsoft DirectX, which can be exploited by malicious people to compromise a vulnerable system. 1) An error in the Windows MJPEG Codec when performing error checking on MJPEG video streams embedded in ASF or AVI media files can be exploited to execute arbitrary code via a specially crafted MJPEG file. 2) An error in the parsing of the parameters of Synchronized Accessible Media Interchange (SAMI) file types can be exploited to execute arbitrary code via a specially crafted SAMI file. SOLUTION: Apply patches. Windows 2000 SP4 with DirectX 7.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=65640123-a9e4-455c-a51a-9df28bd2d412 Windows 2000 SP4 with DirectX 8.1: http://www.microsoft.com/downloads/details.aspx?FamilyId=c6a28d45-13cf-48c4-8f89-3417d552e90b Windows 2000 SP4 with DirectX 9.0, 9.0b, or 9.0c: http://www.microsoft.com/downloads/details.aspx?FamilyId=4dc47e04-5e95-4636-a814-3f912d961461 Windows XP SP2/SP3 with DirectX 9.0, 9.0b, or 9.0c: http://www.microsoft.com/downloads/details.aspx?FamilyId=7aaa6427-1e22-4566-960c-836a3b9e5f36 Windows XP Professional x64 Edition (optionally with SP2) with DirectX 9.0, 9.0b, or 9.0c: http://www.microsoft.com/downloads/details.aspx?FamilyId=5e8e7e9d-828d-442c-acac-8d91e80dfb36 Windows Server 2003 SP1/SP2 with DirectX 9.0, 9.0b, or 9.0c: http://www.microsoft.com/downloads/details.aspx?FamilyId=2274ecb2-2802-47e2-84fd-6621fcb17758 Windows Server 2003 x64 Edition (optionally with SP2) with DirectX 9.0, 9.0b, or 9.0c: http://www.microsoft.com/downloads/details.aspx?FamilyId=5ba63bb7-ed6d-4c59-88b3-456eda07e190 Windows Server 2003 with SP1/SP2 for Itanium-based systems with DirectX 9.0, 9.0b, or 9.0c: http://www.microsoft.com/downloads/details.aspx?FamilyId=be71c002-2f64-49e9-9f4b-ba99c4f3caf6 Windows Vista (optionally with SP1) with DirectX 10.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=4d4b305b-57f8-448d-92fa-3dcdd1f42ed7 Windows Vista x64 Edition (optionally with SP1) with DirectX 10.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=b040cfad-2290-44f4-8f5a-5d1ed98a7265 Windows Server 2008 for 32-bit Systems with DirectX 10.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=c0c495f8-2a35-4638-a635-1e55dd15e062 Windows Server 2008 for x64-based Systems with DirectX 10.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=0b70fc2e-4e80-4ae8-8682-41ea04c24e4e Windows Server 2008 for Itanium-based Systems with DirectX 10.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=80ec83e0-cfb8-4a5e-9254-6679a7225b83 PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Mark Dowd, IBM Internet Security Systems X-Force 2) An anonymous researcher, reported via ZDI ORIGINAL ADVISORY: MS08-033 (951698): http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------