Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.800829
Kategorie:Buffer overflow
Titel:Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
Zusammenfassung:Microsoft Video ActiveX Control is prone to a buffer overflow vulnerability.
Beschreibung:Summary:
Microsoft Video ActiveX Control is prone to a buffer overflow vulnerability.

Vulnerability Insight:
- Stack-based buffer overflow error in MPEG2TuneRequest in msvidctl.dll in
Microsoft DirectShow can be exploited via a crafted web page.

- Unspecified error in msvidctl.dll is caused via unknown vectors that trigger
memory corruption.

Vulnerability Impact:
Successful exploitation could allow execution of arbitrary code that affects
the TV Tuner library, and can cause memory corruption.

Affected Software/OS:
Microsoft Video ActiveX Control on Microsoft Windows 2000/XP/2003.

Solution:
The vendor has released updates. Please see the references for more information.

Workaround: Set the killbit for the CLSID {0955AC62-BF2E-4CBA-A2B9-A63F772D46CF}

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-0015
BugTraq ID: 35558
http://www.securityfocus.com/bid/35558
BugTraq ID: 35585
http://www.securityfocus.com/bid/35585
Cert/CC Advisory: TA09-187A
http://www.us-cert.gov/cas/techalerts/TA09-187A.html
Cert/CC Advisory: TA09-195A
http://www.us-cert.gov/cas/techalerts/TA09-195A.html
Cert/CC Advisory: TA09-223A
http://www.us-cert.gov/cas/techalerts/TA09-223A.html
CERT/CC vulnerability note: VU#180513
http://www.kb.cert.org/vuls/id/180513
ISS Security Advisory: 20090706 Multiple Microsoft Video Control ActiveX Remote Code Execution Vulnerabilities
http://www.iss.net/threats/329.html
http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx
http://isc.sans.org/diary.html?storyid=6733
http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799
Microsoft Security Bulletin: MS09-032
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032
Microsoft Security Bulletin: MS09-037
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037
http://osvdb.org/55651
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436
http://www.securitytracker.com/id?1022514
http://secunia.com/advisories/36187
http://www.vupen.com/english/advisories/2009/2232
Common Vulnerability Exposure (CVE) ID: CVE-2008-0020
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5850
http://www.securitytracker.com/id?1022712
CopyrightCopyright (C) 2009 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.