Microsoft Windows contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code.
Microsoft Windows 2000 SP4 and prior, XP SP3 and prior and Windows Server 2003 SP2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code.
This vulnerability exists due to insufficient boundary restrictions by DirectShow. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to visit a malicious website. An exploit could allow the attacker to execute arbitrary code with the privileges of the user.
Microsoft has confirmed this vulnerability in a security bulletin and released updated software.
Microsoft DirectShow components of DirectX versions 7.0, 8.1, and 9.0 are vulnerable when running on the following platforms:
Windows 2000 SP4 and prior
Windows XP SP3 and prior
Windows XP Professional x64 Edition SP2 and prior
Windows Server 2003 SP2 and prior
Windows Server 2003 x64 Edition SP2 and prior
Windows Server 2003 for Itanium-based Systems with SP2 and prior
An attacker cannot directly exploit this vulnerability, and instead must rely upon user participation in order to accomplish an exploit. An attacker may attempt to embed malicious content on compromised websites that launch exploits against users who visit those sites. Attackers may also attempt to convince users to visit malicious sites by sending links within e-mail messages to users.
If an exploit is successful, the attacker could execute arbitrary code with the privileges of the user. Exploitation on systems that allow users to run programs with Administrator privileges could result in a complete compromise. However, the impact is likely to be less on systems that only allow users to run programs with limited privileges, as any executed code would run in a restricted security context.
The Cisco Applied Intelligence team has created an Applied Mitigation Bulletin to address vulnerabilities that Microsoft disclosed in the July 2009 security bulletin release. This Cisco bulletin, which assists administrators in identifying or mitigating these vulnerabilities using Cisco devices, is available at the following link: Cisco Applied Mitigation Bulletin: Microsoft Security Bulletin for July 2009
The update available from Microsoft corrects this vulnerability by properly checking the size of parameters within QuickTime content.
Microsoft has released a security bulletin at the following link: MS09-028
An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute code resulting in a complete system compromise.
This vulnerability exists due to insufficient boundary restrictions on fields contained within QuickTime content processed by the DirectX DirectShow quartz.dll component. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious website. The processing of the malicious content could allow the attacker to execute arbitrary code with the privileges of the user.
Administrators are advised to apply the available software updates.
Administrators may consider unregistering or disabling access to the quartz.dll component in order to prevent the processing of QuickTime content.
Users are advised not to visit websites or follow links that have suspicious characteristics or cannot be verified as safe.
Users are advised to run applications with the least necessary privileges.
Microsoft customers can obtain updates directly by using the links in the security bulletin. These updates are also distributed by Windows automatic update features and available on the Windows Update website. Microsoft Windows Server Update Services (WSUS), Systems Management Server, and System Center Configuration Manager can assist administrators in deploying software updates.
Home Edition Base, SP1, SP2, SP3 | Professional Edition Base, SP1, SP2, SP3 | Professional x64 (AMD/EM64T) Base, SP1
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.