MS.Windows.MJPEG.Media.Decompression.Code.Execution
Description
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Windows.
The vulnerability is caused by an error when the vulnerable software handles a media file with malformed JPEG frames. It may allow remote attackers to execute arbitrary code by sending a crafted media file.
Affected Products
Quartz.dll (DirectShow) (DirectX 9) when installed on Microsoft Windows 2000 Service Pack 4
Quartz.dll (DirectShow) on Windows XP Service Pack 2 and Windows XP Service Pack 3
Quartz.dll (DirectShow) on Windows XP Professional x64 Edition Service Pack 2
Quartz.dll (DirectShow) on Windows Server 2003 Service Pack 2
Quartz.dll (DirectShow) on Windows Server 2003 x64 Edition Service Pack 2
Quartz.dll (DirectShow) on Windows Vista Service Pack 1
Quartz.dll (DirectShow) on Windows Vista x64 Edition Service Pack 1
Quartz.dll (DirectShow) on Windows Server 2008 for 32-bit Systems
Quartz.dll (DirectShow) on Windows Server 2008 for x64-based Systems
Quartz.dll (DirectShow) on Windows Server 2008 for Itanium-based Systems
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's web site for the suggested workaround:
http://www.microsoft.com/technet/security/Bulletin/ms10-033.mspx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |