CVE-2007-0064
NONEHeap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted
Опубликовано: 12/12/2007Обновлено: 4/9/2025
Описание
Heap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file.
ИИ-АнализНа базе ИИ
Затронутые продукты
microsoftwindows_2000
microsoftwindows_media_format_runtime
7.1
microsoftwindows_2000
microsoftwindows_xp
microsoftwindows_media_format_runtime
9
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
9.5
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
9.5
microsoftwindows_vista
microsoftwindows_vista
-
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_xp
microsoftwindows_media_format_runtime
11
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_2003_server
microsoftwindows_media_services
9.1
Ссылки
- http://secunia.com/advisories/28034Vendor Advisory
- http://www.kb.cert.org/vuls/id/319385US Government Resource
- http://www.securityfocus.com/archive/1/485268/100/0/threaded
- http://www.securityfocus.com/bid/26776
- http://www.securitytracker.com/id?1019074
- http://www.us-cert.gov/cas/techalerts/TA07-345A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2007/4183Vendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3622
- http://secunia.com/advisories/28034Vendor Advisory
- http://www.kb.cert.org/vuls/id/319385US Government Resource
- http://www.securityfocus.com/archive/1/485268/100/0/threaded
- http://www.securityfocus.com/bid/26776
- http://www.securitytracker.com/id?1019074
- http://www.us-cert.gov/cas/techalerts/TA07-345A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2007/4183Vendor Advisory
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3622