HTTP: Microsoft DirectShow QuickTime stsc Atom Parsing Memory Corruption
This signature detects attempts to exploit a known vulnerability in Microsoft DirectShow QuickTime Movie Parser filter. It is due to improper input validation when parsing crafted stsc atoms in QuickTime format files. A successful attack can lead to memory corruption and arbitrary code execution.
Extended Description
Microsoft DirectX is prone to a remote code-execution vulnerability that resides in the DirectShow component. Successful exploits allow remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.
Affected Products
Nortel_networks self-service_media_processing_server,Nortel_networks contact_center-cct
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Microsoft
9.3