|
 |
3ivx MPEG-4 MP4 File Processing Buffer Overflows
|
|
|
|
Secunia Advisory:
|
SA27998
|
|
Release Date:
|
2007-12-10
|
|
Critical:
|

Highly critical
|
Impact:
|
System access
|
Where:
|
From remote
|
Solution Status:
|
Unpatched
|
|
Software: | 3ivx MPEG-4 5.x
|
|
|
This advisory is currently marked as unpatched! - Companies can be alerted when a patch is released! |
|
Description: SYS 49152 has discovered some vulnerabilities in 3ivx MPEG-4, which can be exploited by malicious people to compromise a user's system.
The vulnerabilities are caused due to boundary errors in 3ivxDSMediaSplitter.ax when processing certain atoms ("©art", "©nam", "©cmt", "©des", and "©cpy") in MP4 files and can be exploited to cause stack-based buffer overflows via a specially crafted MP4 file.
Successful exploitation allows execution of arbitrary code.
The vulnerabilities are confirmed in version 5.0.1 with the following applications as attack vectors:
* Windows Media Player version 6.4.09.1130 (mplayer2.exe)
* Media Player Classic version 6.4.9.0
Other versions and applications may also be affected.
Solution: Do not open untrusted MP4 files.
Provided and/or discovered by: SYS 49152
Original Advisory: milw0rm:
http://www.milw0rm.com/exploits/4701
http://www.milw0rm.com/exploits/4702
|
|
|
|
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
|
|
|
Send Feedback to Secunia
|
|
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.
Ideas, suggestions, and other feedback are most welcome.
|
|
|
|

|
 |
|
|
Secunia Poll
|
|
|
|
Most Popular Advisories
|
|
|
|
|