HTTP: Microsoft DirectShow QuickTime Atom Size Memory Corruption

This signature detects attempts to exploit a known vulnerability in the Microsoft DirectShow QuickTime. A successful attack can lead to a memory corruption and arbitrary remote code execution within the context of the affected application.

Extended Description

Microsoft DirectX is prone to a remote code-execution vulnerability that resides in the DirectShow component. Successful exploits allow remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

Nortel_networks self-service_media_processing_server,Nortel_networks contact_center-cct

References

BugTraq: 35616

CVE: CVE-2009-1539

Short Name
HTTP:STC:DL:DIRECTSHOW-QUICK-MC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Atom CVE-2009-1539 Corruption DirectShow Memory Microsoft QuickTime Size bid:35616
Release Date
08/01/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

CVSS Score

9.3

Found a potential security threat?