説明
Heap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file.
AI分析AIによる分析
影響を受ける製品
microsoftwindows_2000
microsoftwindows_media_format_runtime
7.1
microsoftwindows_2000
microsoftwindows_xp
microsoftwindows_media_format_runtime
9
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
9.5
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
9.5
microsoftwindows_vista
microsoftwindows_vista
-
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
11
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_media_services
9.1
参照
- http://secunia.com/advisories/28034Vendor Advisory
- http://www.kb.cert.org/vuls/id/319385US Government Resource
- http://www.securityfocus.com/archive/1/485268/100/0/threaded
- http://www.securityfocus.com/bid/26776
- http://www.securitytracker.com/id?1019074
- http://www.us-cert.gov/cas/techalerts/TA07-345A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2007/4183Vendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3622
- http://secunia.com/advisories/28034Vendor Advisory
- http://www.kb.cert.org/vuls/id/319385US Government Resource
- http://www.securityfocus.com/archive/1/485268/100/0/threaded
- http://www.securityfocus.com/bid/26776
- http://www.securitytracker.com/id?1019074
- http://www.us-cert.gov/cas/techalerts/TA07-345A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2007/4183Vendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3622