CVE-2007-0064
NONEHeap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted
Published: 12/12/2007Updated: 4/9/2025
Description
Heap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file.
AI AnalysisPowered by AI
Affected Products
microsoftwindows_2000
microsoftwindows_media_format_runtime
7.1
microsoftwindows_2000
microsoftwindows_xp
microsoftwindows_media_format_runtime
9
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
9.5
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
9.5
microsoftwindows_vista
microsoftwindows_vista
-
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
11
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_media_services
9.1
References
- http://secunia.com/advisories/28034Vendor Advisory
- http://www.kb.cert.org/vuls/id/319385US Government Resource
- http://www.securityfocus.com/archive/1/485268/100/0/threaded
- http://www.securityfocus.com/bid/26776
- http://www.securitytracker.com/id?1019074
- http://www.us-cert.gov/cas/techalerts/TA07-345A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2007/4183Vendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3622
- http://secunia.com/advisories/28034Vendor Advisory
- http://www.kb.cert.org/vuls/id/319385US Government Resource
- http://www.securityfocus.com/archive/1/485268/100/0/threaded
- http://www.securityfocus.com/bid/26776
- http://www.securitytracker.com/id?1019074
- http://www.us-cert.gov/cas/techalerts/TA07-345A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2007/4183Vendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3622