HTTP: Microsoft DirectX Crafted MJPEG Stream Handling Code Execution

This signature detects attempts to exploit a known vulnerability against Microsoft DirectX. A successful attack can lead to arbitrary code execution.

Extended Description

Microsoft DirectX is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition. NOTE: Supported editions of Windows Server 2008 are not affected if installed using the Server Core installation option.

Affected Products

Nortel_networks self-service_media_processing_server,Nortel_networks centrex_ip_client_manager

References

BugTraq: 29581

CVE: CVE-2008-0011

Short Name
HTTP:STC:STREAM:DIRECTX-MJPEG
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2008-0011 Code Crafted DirectX Execution Handling MJPEG Microsoft Stream bid:29581
Release Date
10/06/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?