Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Vulnerability Alert

Microsoft Windows DirectShow QuickTime Media Processing Arbitrary Code Execution Vulnerability

 
Threat Type:CWE-94: Code Injection
IntelliShield ID:18366
Version:3
First Published:2009 May 29 13:35 GMT
Last Published:2009 July 14 18:45 GMT
Port: Not available
CVE:CVE-2009-1537
BugTraq ID:35139
Urgency:Possible use
Credibility:Confirmed
Severity:Moderate Damage
CVSS Base:9.3 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:7.7
 
Version Summary:

Microsoft has released a security bulletin along with software updates to address the Windows DirectShow QuickTime media processing arbitrary code execution vulnerability.

 
 
Description

Microsoft Windows 2000, Windows XP, and Windows Server 2003 contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code.

The vulnerability exists because Microsoft DirectShow does not properly handle QuickTime media files.? An attacker could exploit this vulnerability by convincing a user to view a malformed QuickTime media file, which may be hosted on a malicious website.? An exploit could allow the attacker to execute arbitrary code with the privileges of the user, which may allow the attacker to completely?compromise an affected system.

Functional exploit code that exploits this vulnerability is reportedly being used in limited, active attacks.

Microsoft has confirmed this vulnerability in a security bulletin and released software updates.

 
Warning Indicators

Microsoft DirectShow components of DirectX versions 7.0, 8.1, and 9.0 are vulnerable when running on the following platforms:

  • Windows 2000 SP4 and prior
  • Windows XP SP3 and prior
  • Windows XP Professional x64 Edition SP2 and prior
  • Windows Server 2003 SP2 and prior
  • Windows Server 2003 x64 Edition SP2 and prior
  • Windows Server 2003 for Itanium-based Systems with SP2?and prior

Attackers may use e-mail messages, instant messages, social networks, or other communications to deliver a malicious QuickTime file or a link to a malicious website that hosts such a file.? These messages may use social engineering techniques to entice the user to view a video, possibly relying on current events or other appealing content to do so.

 
IntelliShield Analysis

An attacker cannot directly exploit this vulnerability but must rely on a user to open a malformed QuickTime media file or visit a malicious website.? Although this factor may limit automatic exploitation of this vulnerability, the popularity of online video content and the possibility for social engineering to generate strong enticement for users may elevate the risk posed that this vulnerability poses.

Because the Windows Explorer interface may use the vulnerable component to preview files, it may not be necessary for attackers to convince a user to open a file for an exploit to occur.? The attacker may only need to convince the user to download the file.? Whenever the user views the directory containing the file, the preview of the file may trigger the vulnerability.? File previews may also work on remote drive shares, removing the requirement for an attacker to place a file on the user's system, reducing the complexity of an attack.

The Cisco Applied Intelligence team has created an Applied Mitigation Bulletin to address vulnerabilities that Microsoft disclosed in the July 2009 security bulletin release. This Cisco bulletin, which assists administrators in identifying or mitigating these vulnerabilities using Cisco devices, is available at the following link: Cisco Applied Mitigation Bulletin: Microsoft Security Bulletin for July 2009?

The update available from Microsoft corrects this vulnerability by improving the handling of QuickTime content by the vulnerable component.

 
Vendor Announcements

Microsoft has released a security bulletin at the following link: MS09-028?

Microsoft has released a security advisory at the following link: 971778

 
Impact

An exploit of this vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of a user who viewed a malformed QuickTime media file.? If the user possesses elevated privileges, the attacker may be able to gain complete control over an affected system.

 
Technical Information

The vulnerability exists because the QuickTime Movie Parser Filter functionality of the quartz.dll library in the Microsoft Windows DirectShow component does not properly handle malformed QuickTime media files.? Because the QuickTime Movie Parser Filter has been removed from Windows Vista and Windows Server 2008, these platforms are not affected by this vulnerability.

An attacker could exploit this vulnerability by convincing a user to view a malformed QuickTime media file that calls the quartz.dll system library.? This vulnerability is exploitable regardless of whether Apple QuickTime is installed on an affected system.? It is therefore possible to deliver an exploit through a local file using Windows Media Player or any browser that supports QuickTime playback via this system library.? An exploit could allow the attacker to execute arbitrary code.

Additional technical details are not available.

 
Safeguards

Administrators are advised to apply the available software update.

Administrators are advised to warn users not to view media files from untrusted sources.

Users are advised to disable QuickTime parsing by running the?tool provided by Microsoft.

Administrators may consider disabling the processing of QuickTime content in quartz.dll by deleting the following registry key:

HKEY_CLASSES_ROOT\CLSID\{D51BD5A0-7548-11CF-A520-0080C77EF58A}

Administrators may consider setting ACLs on quartz.dll to prevent users from accessing it.

Administrators may consider unregistering quartz.dll.

Users are advised not to follow unsolicited links.? Users should verify the authenticity of unexpected links prior to following them.

Users are advised not to open unexpected e-mail attachments or executables from untrusted sources.

Users are advised to run applications with the least necessary privileges.

 
Patches/Software

Microsoft customers can obtain updates directly by using the links in the security bulletin. These updates are also distributed by Windows automatic update features and available on the Windows Update website. Microsoft Windows Server Update Services (WSUS), Systems Management Server, and System Center Configuration Manager can assist administrators in deploying software updates.


Signatures
 
Cisco Intrusion Prevention System (IPS) 6.0
Signature IDSignature NameReleaseLatest Release Date
1143/0DirectX NULL Byte Overwrite VulnerabilityS6422012 Apr 19 
19219/0DirectShow QuickTime Media Processing Arbitrary Code ExecutionS4102009 Jul 03 
19219/1DirectShow QuickTime Media Processing Arbitrary Code ExecutionS4142009 Jul 14 
19219/2DirectShow QuickTime Media Processing Arbitrary Code ExecutionS5042010 Jul 29 
19219/3DirectShow QuickTime Media Processing Arbitrary Code ExecutionS4102009 Jul 03 
19219/4DirectShow QuickTime Media Processing Arbitrary Code ExecutionS5042010 Jul 29 
 
Alert History
 

Version 2, June 3, 2009, 8:42 AM: Microsoft has released a tool that will disable QuickTime parsing without requiring registry editing.

Version 1, May 29, 2009, 9:35 AM: Microsoft Windows DirectShow contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code.? Updates are not available, and Microsoft has indicated that limited, active attacks are occurring.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
Microsoft, Inc.DirectX 7.0 Base | 8.1 Base, a, b | 9.0 Base, a, b, c

Associated Products:
Microsoft, Inc.Windows 2000 Advanced Server Base, SP1, SP2, SP3, SP4 | Datacenter Server Base, SP1, SP2, SP3, SP4 | Professional Base, SP1, SP2, SP3, SP4 | Server Base, SP1, SP2, SP3, SP4
Microsoft, Inc.Windows Server 2003 Datacenter Edition Base, SP1, SP2 | Datacenter Edition, 64-bit (Itanium) Base, SP1, SP2 | Datacenter Edition x64 (AMD/EM64T) Base, SP2 | Enterprise Edition Base, SP1, SP2 | Enterprise Edition, 64-bit (Itanium) Base, SP1, SP2 | Enterprise Edition x64 (AMD/EM64T) Base, SP2 | Standard Edition Base, SP1, SP2 | Standard Edition, 64-bit (Itanium) Base, SP1, SP2 | Standard Edition x64 (AMD/EM64T) Base, SP2 | Web Edition Base, SP1, SP2
Microsoft, Inc.Windows XP Home Edition Base, SP1, SP2, SP3 | Professional Edition Base, SP1, SP2, SP3 | Professional Edition, 64-bit (Itanium) Base, SP1, SP2 | Professional x64 (AMD/EM64T) Base, SP2




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield