APP: Microsoft Windows Media Service Remote Code Execution
This signature detects attempts to exploit a known vulnerability against Windows Media Service. A successful attack can allow attackers to take complete control of an affected system. Thereby enabling them to install programs; view, change, delete data; or create new accounts with full user rights.
Extended Description
Microsoft Windows Media Service is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Update (April 21, 2010): Microsoft reports that the patch released as MS10-025 does not resolve this issue. Microsoft intends to release a new fix in the following week; this BID will be updated as more information emerges. Update (April 27, 2010): Updated MS10-025 includes a new fix.
Affected Products
Nortel_networks self-service_media_processing_server,Microsoft windows_2000_professional
srx-branch-19.3
vsrx3bsd-19.2
srx-19.4
vsrx3bsd-19.4
srx-branch-19.4
vsrx-19.4
vsrx-19.2
srx-19.3
srx-branch-12.3
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx-12.3
vmx-19.3
srx-12.3
Nortel_networks
Microsoft
9.3