HTTP: Microsoft DirectShow QuickTime stsc Atom Parsing Memory Corruption

This signature detects attempts to exploit a known vulnerability in Microsoft DirectShow QuickTime Movie Parser filter. It is due to improper input validation when parsing crafted stsc atoms in QuickTime format files. A successful attack can lead to memory corruption and arbitrary code execution.

Extended Description

Microsoft DirectX is prone to a remote code-execution vulnerability that resides in the DirectShow component. Successful exploits allow remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

Nortel_networks self-service_media_processing_server,Nortel_networks contact_center-cct

References

BugTraq: 35600

CVE: CVE-2009-1538

Short Name
HTTP:STC:DL:QT-STSC-ATOM-MC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Atom CVE-2009-1538 Corruption DirectShow Memory Microsoft Parsing QuickTime bid:35600 stsc
Release Date
12/21/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3739
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

CVSS Score

9.3

Found a potential security threat?