Page 131 of 1003 results (0.011 seconds)

CVSS: 9.3EPSS: 52%CPEs: 10EXPL: 0

The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 performs updates to pointers without properly validating unspecified data values, which allows remote attackers to execute arbitrary code via a crafted QuickTime media file, aka "DirectX Pointer Validation Vulnerability." EL QuickTime Movie Parser Filter en quartz.dll en DirectShow en Microsoft DirectX v7.0 a la v9.0c sobre Windows 2000 SP4, Windows XP SP2 y SP3, y Windows Server 2003 SP2, realiza actualizaciones a punteros sin validar adecuadamente los valores de datos no especificados, lo que permite a atacantes remotos ejecutar código de su elección a través de un archivo "Quicktime media" manipulado, también conocido como "Vulnerabilidad de validación de Puntero en DirectX". • http://osvdb.org/55844 http://www.securityfocus.com/bid/35600 http://www.us-cert.gov/cas/techalerts/TA09-195A.html http://www.vupen.com/english/advisories/2009/1886 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5963 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 26%CPEs: 10EXPL: 0

The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DirectX Size Validation Vulnerability." EL QuickTime Movie Parser Filter en quartz.dll en DirectShow en Microsoft DirectX v7.0 a la v9.0c sobre Windows 2000 SP4, Windows XP SP2 y SP3, y Windows Server 2003 SP2, no valida adecuadamente el tamaño sin especificar de los campos en los archivos "Quicktime media", lo que permite a atacantes remotos ejecutar código de su elección a través de un archivo manipulado, también conocido como "Vulnerabilidad de validación de tamaño en DirectX". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required in that a target must visit a malicious page or open a malicious video file. The specific flaw exists within the parsing of the length records of certain QuickTime atoms. The application implicitly trusts the length during a transformation which will lead to memory corruption and can be leveraged to execute arbitrary code under the context of the current user. • http://osvdb.org/55845 http://www.us-cert.gov/cas/techalerts/TA09-195A.html http://www.vupen.com/english/advisories/2009/1886 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6341 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 96%CPEs: 6EXPL: 5

Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability." Desbordamiento de búfer basado en la pila MPEG2TuneRequest en la dll svidctl del control Microsoft Video ActiveX en Microsoft DirectShow para Windows 2000, XP, y Server 2003 permiten a atacantes remotos ejecutar código arbitrario a tra´ves de páginas web manipuladas, como se ha explotado libremente Julio de 2009. • https://www.exploit-db.com/exploits/16615 https://www.exploit-db.com/exploits/9108 http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx http://isc.sans.org/diary.html?storyid=6733 http://osvdb.org/55651 http://secunia.com/advisories/36187 http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799 http://www.iss.net/threats/329.html http://www.kb.cert.org/vuls/id/180513 http://www.microsoft.com&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 94%CPEs: 6EXPL: 0

Unspecified vulnerability in the Load method in the IPersistStreamInit interface in the Active Template Library (ATL), as used in the Microsoft Video ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption, aka "ATL Header Memcopy Vulnerability," a different vulnerability than CVE-2008-0015. Una vulnerabilidad no especificada en el método Load en la interfaz IPersistStreamInit de Active Template Library (ATL), tal y como es usado en el control ActiveX de Microsoft Video en la biblioteca msvidctl.dll en DirectShow, en Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, Vista versión Gold, SP1, y SP2, y Server 2008 versión Gold y SP2 de Microsoft, permite a los atacantes remotos ejecutar código arbitrario por medio de vectores desconocidos que desencadenan una corrupción de memoria, también se conoce como "ATL Header Memcopy Vulnerability", una vulnerabilidad diferente de CVE-2008-0015. • http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx http://secunia.com/advisories/36187 http://www.iss.net/threats/329.html http://www.securitytracker.com/id?1022712 http://www.us-cert.gov/cas/techalerts/TA09-223A.html http://www.vupen.com/english/advisories/2009/2232 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg& • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 0

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate user-mode pointers in unspecified error conditions, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Pointer Validation Vulnerability." El Kernel en Microsoft Windows 2000 SP4, XP SP2 y XP SP3, Server 2003 SP2, Vista Gold, SP1, y SP2, y Server 2008 SP2 no validan de forma apropiada los punteros en modo usuario, bajo condiciones de error no especificadas, lo que permite a usuarios locales ganar privilegios a través de aplicaciones manipuladas, también conocido como (Vulnerabilidad de validación de punteros en el Kernel de Windows. • http://osvdb.org/54941 http://secunia.com/advisories/35372 http://www.securityfocus.com/bid/35238 http://www.securitytracker.com/id?1022359 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1544 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6231 • CWE-20: Improper Input Validation •