{"vuid":"VU#321233","idnumber":"321233","name":"Microsoft DirectX remote code execution","keywords":["Microsoft","DirectX","remote code execution. WAV file","AVI file","ms07-dec"],"overview":"Microsoft DirectX is vulnerable to a remote code execution vulnerability which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft DirectX is a feature of the Microsoft Windows operating system used for streaming multimedia content. DirectX integrates DirectShow technology to provide high-quality capture of streaming media such as video and audio. A stack-based buffer overflow exists due to DirectShow's improper parsing of WAV and AVI files. By successfully persuading a user to access a specially crafted WAV or AVI file, a remote, unauthenticated attacker could trigger the buffer overflow.","impact":"A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system.","resolution":"Microsoft has published Microsoft Security Bulletin MS07-064 in response to this issue. Users are strongly encouraged to review this bulletin and apply the referenced patches.","workarounds":"In addition to the patches referenced above, Microsoft has published workarounds for this issue. Users who are unable to apply the patches are strongly encouraged to implement these workarounds as appropriate.","sysaffected":"","thanks":"Microsoft credits Peter Winter-Smith of \nNGSSoftware\n for reporting this vulnerability.","author":"This document was written by Joseph W. Pruszynski.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","7","-","0","6","4",".","m","s","p","x"],"cveids":["CVE-2007-3895"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-12-11T19:37:23Z","publicdate":"2007-12-11T00:00:00Z","datefirstpublished":"2007-12-14T16:20:06Z","dateupdated":"2007-12-14T16:20:19Z","revision":5,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"9","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"11","cam_impact":"13","cam_easeofexploitation":"13","cam_attackeraccessrequired":"16","cam_scorecurrent":"7.2501","cam_scorecurrentwidelyknown":"13.3848","cam_scorecurrentwidelyknownexploited":"24.5388","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.2501,"vulnote":null}