HTTP: 3ivx MPEG-4 MP4 File Handling Stack Overflow

This signature detects attempts to exploit a known buffer overflow vulnerability in 3ivx MPEG-4. It is due to improper handling of MP4 files by the 3ivx MPEG-4 codec plugin. A remote attacker can exploit this by enticing the target user to open crafted MP4 file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged in user. In a simple attack, the affected media player application can terminate when the malicious file is opened. In a sophisticated attack, where the malicious user is successful in injecting and executing supplied code, the behavior of the system is dependent on the nature of the injected code. It is executed in the security context of the currently logged in user.

Extended Description

3ivx MPEG-4 is prone to multiple stack-based buffer-overflow issues because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts likely result in denial-of-service conditions. 3ivx MPEG-4 5.0.1 is vulnerable; other versions may also be affected. NOTE: This BID originally listed Windows Media Player as vulnerable, but has been updated to reflect the fact that the issues reside in 3ivx MPEG-4.

Affected Products

3ivx 3ivx_mpeg-4

References

BugTraq: 26773

Short Name
HTTP:STC:DL:MPEG4-3IVX-FILE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
3ivx File Handling MP4 MPEG-4 Overflow Stack bid:26773
Release Date
10/19/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

3ivx

Found a potential security threat?