Overview
Microsoft DirectX is vulnerable to a remote code execution vulnerability which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
| Microsoft DirectX is a feature of the Microsoft Windows operating system used for streaming multimedia content. DirectX integrates DirectShow technology to provide high-quality capture of streaming media such as video and audio. A stack-based buffer overflow exists due to DirectShow's improper parsing of WAV and AVI files. By successfully persuading a user to access a specially crafted WAV or AVI file, a remote, unauthenticated attacker could trigger the buffer overflow. | 
Impact
| A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system. | 
Solution
| Microsoft has published Microsoft Security Bulletin MS07-064 in response to this issue. Users are strongly encouraged to review this bulletin and apply the referenced patches. | 
| In addition to the patches referenced above, Microsoft has published workarounds for this issue. Users who are unable to apply the patches are strongly encouraged to implement these workarounds as appropriate. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Microsoft credits Peter Winter-Smith of NGSSoftware for reporting this vulnerability.
This document was written by Joseph W. Pruszynski.
Other Information
| CVE IDs: | CVE-2007-3895 | 
| Severity Metric: | 7.25 | 
| Date Public: | 2007-12-11 | 
| Date First Published: | 2007-12-14 | 
| Date Last Updated: | 2007-12-14 16:20 UTC | 
| Document Revision: | 5 |