HTTP: Microsoft Windows Media Format ASF Parsing Code Execution

This signature detects attempts to exploit a known multiple buffer overflow vulnerabilities in Microsoft Windows Media Format processing engine. It is caused due to a boundary error when processing Advanced Systems Format (ASF) files. A remote attacker can exploit this by enticing the target user to open crafted ASF file, which if successful, allows arbitrary code to be injected and executed in the security context of the currently logged in user. The behavior of the target host is entirely dependent on the intended function of the injected code. In an unsuccessful attack, the affected application stops functioning and terminates.

Extended Description

Windows Media Player is prone to a remote code-execution vulnerability because it fails to properly handle malformed media files. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.

Affected Products

Avaya messaging_application_server,Microsoft windows_media_format

References

BugTraq: 26776

CVE: CVE-2007-0064

Short Name
HTTP:STC:STREAM:ASF-WMP
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ASF CVE-2007-0064 Code Execution Format Media Microsoft Parsing Windows bid:26776
Release Date
10/20/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Hp

Avaya

Microsoft

CVSS Score

9.3

Found a potential security threat?