Secunia - Stay Secure
Did you know...
Home Corporate Website Jobs Mailing Lists RSS Blog New entry Advertise
Solutions For
  Security Professionals
  Security Vendors

Free Solutions For
  Open Communities
  Journalists & Media

Software Inspectors
  Scan Online
  Personal (PSI)
  Network (NSI)

Secunia Advisories
  Search
  Historic Advisories
  Listed By Product
  Listed By Vendor
  Statistics / Graphs
  Secunia Research
  Report Vulnerability
  About Advisories

Virus Information
  Chronological List
  Last 10 Virus Alerts
  About Virus Information

Secunia Customers
  Customer Area


3ivx MPEG-4 MP4 File Processing Buffer Overflows Advisory Available in Danish  Advisory Available in German 

Secunia Advisory: SA27998  
Release Date: 2007-12-10

Critical:
Highly critical
Impact: System access
Where: From remote
Solution Status: Unpatched

Software:3ivx MPEG-4 5.x

This advisory is currently marked as unpatched!
- Companies can be alerted when a patch is released!


Description:
SYS 49152 has discovered some vulnerabilities in 3ivx MPEG-4, which can be exploited by malicious people to compromise a user's system.

The vulnerabilities are caused due to boundary errors in 3ivxDSMediaSplitter.ax when processing certain atoms ("©art", "©nam", "©cmt", "©des", and "©cpy") in MP4 files and can be exploited to cause stack-based buffer overflows via a specially crafted MP4 file.

Successful exploitation allows execution of arbitrary code.

The vulnerabilities are confirmed in version 5.0.1 with the following applications as attack vectors:
* Windows Media Player version 6.4.09.1130 (mplayer2.exe)
* Media Player Classic version 6.4.9.0

Other versions and applications may also be affected.

Solution:
Do not open untrusted MP4 files.

Provided and/or discovered by:
SYS 49152

Original Advisory:
milw0rm:
http://www.milw0rm.com/exploits/4701
http://www.milw0rm.com/exploits/4702



Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.








Secunia Personal Software Inspector (BETA)

Secunia Poll

Have your organisation taken any extraordinary steps to remediate the Microsoft Windows URI vulnerability?


See Results   

Most Popular Advisories

1.
3ivx MPEG-4 MP4 File Processing Buffer Overflows
2.
MySQL System Table Information Overwrite Vulnerability
3.
Skype skype4com URI Handler Buffer Overflow
4.
bitweaver Cross-Site Scripting Vulnerabilities
5.
Sun StarOffice/Star Suite Database Document Processing Arbitrary Java Method Execution
6.
Gentoo update for emul-linux-x86- qtlibs
7.
Ace Image Hosting Script "id" SQL Injection Vulnerability
8.
DWdirectory "search" SQL Injection Vulnerability
9.
Mac OS X vpnd Denial of Service Vulnerability
10.
wwwstats "link" Script Insertion Vulnerability





Vulnerability Management - Terms & Conditions - Copyright 2002-2007 Secunia - Compliance - Contact Secunia