Secunia Advisory SA38791Microsoft Windows Movie Maker Buffer Overflow Vulnerability
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a logic error in the bundled Movie Maker application within the "IsValidWMToolsStream()" function when parsing project files. This can be exploited to cause a buffer overflow when viewing a specially crafted file. Successful exploitation allows execution of arbitrary code. NOTE: Systems running Windows 7 do not bundle Movie Maker and are, therefore, not affected by default. Solution Provided and/or discovered by Alternate/detailed remediation Deep Links Do you have additional information related to this advisory?Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Fedora update for samba |
Debian update for tdiary |