// For flags

CVE-2009-1539

Microsoft DirectShow Quicktime Atom Parsing Memory Corruption Vulnerability

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DirectX Size Validation Vulnerability."

EL QuickTime Movie Parser Filter en quartz.dll en DirectShow en Microsoft DirectX v7.0 a la v9.0c sobre Windows 2000 SP4, Windows XP SP2 y SP3, y Windows Server 2003 SP2, no valida adecuadamente el tamaño sin especificar de los campos en los archivos "Quicktime media", lo que permite a atacantes remotos ejecutar código de su elección a través de un archivo manipulado, también conocido como "Vulnerabilidad de validación de tamaño en DirectX".

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required in that a target must visit a malicious page or open a malicious video file.
The specific flaw exists within the parsing of the length records of certain QuickTime atoms. The application implicitly trusts the length during a transformation which will lead to memory corruption and can be leveraged to execute arbitrary code under the context of the current user.

*Credits: Anonymous
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-05-05 CVE Reserved
  • 2009-07-14 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-08 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Directx
Search vendor "Microsoft" for product "Directx"
7.0
Search vendor "Microsoft" for product "Directx" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2000
Search vendor "Microsoft" for product "Windows 2000"
-sp4
Affected
Microsoft
Search vendor "Microsoft"
Directx
Search vendor "Microsoft" for product "Directx"
8.1
Search vendor "Microsoft" for product "Directx" and version "8.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2000
Search vendor "Microsoft" for product "Windows 2000"
-sp4
Affected
Microsoft
Search vendor "Microsoft"
Directx
Search vendor "Microsoft" for product "Directx"
9.0
Search vendor "Microsoft" for product "Directx" and version "9.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2000
Search vendor "Microsoft" for product "Windows 2000"
-sp4
Affected
Microsoft
Search vendor "Microsoft"
Directx
Search vendor "Microsoft" for product "Directx"
9.0
Search vendor "Microsoft" for product "Directx" and version "9.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Server 2003
Search vendor "Microsoft" for product "Windows Server 2003"
*sp2
Affected
Microsoft
Search vendor "Microsoft"
Directx
Search vendor "Microsoft" for product "Directx"
9.0
Search vendor "Microsoft" for product "Directx" and version "9.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Xp
Search vendor "Microsoft" for product "Windows Xp"
-sp2
Affected
Microsoft
Search vendor "Microsoft"
Directx
Search vendor "Microsoft" for product "Directx"
9.0
Search vendor "Microsoft" for product "Directx" and version "9.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Xp
Search vendor "Microsoft" for product "Windows Xp"
-sp2, x64
Affected
Microsoft
Search vendor "Microsoft"
Directx
Search vendor "Microsoft" for product "Directx"
9.0
Search vendor "Microsoft" for product "Directx" and version "9.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Xp
Search vendor "Microsoft" for product "Windows Xp"
-sp3
Affected