Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Windows Media Handling Components Cause Security Grief

Severity: High

11 December, 2007

Summary:

Today, Microsoft released two security bulletins describing vulnerabilities that affect components Windows uses to handle multimedia (specifically, DirectX and the Windows Media File Format Runtime). A remote attacker could exploit the flaws in these components to execute code on your Windows PC, potentially gaining complete control of it. If you manage a Windows network, you should download, test, and deploy the appropriate patches throughout your network as soon as possible.

Exposure:

Microsoft’s security bulletins detail vulnerabilities found in two Windows components used to handle multimedia. We summarize these vulnerabilities below:

MS07-064: Two Remote Code Execution Vulnerabilities in DirectX

Severity: High

11 December, 2007

Summary:

Today, Microsoft released two security bulletins describing vulnerabilities that affect components Windows uses to handle multimedia (specifically, DirectX and the Windows Media File Format Runtime). A remote attacker could exploit the flaws in these components to execute code on your Windows PC, potentially gaining complete control of it. If you manage a Windows network, you should download, test, and deploy the appropriate patches throughout your network as soon as possible.

Exposure:

Microsoft’s security bulletins detail vulnerabilities found in two Windows components used to handle multimedia. We summarize these vulnerabilities below:

MS07-064: Two Remote Code Execution Vulnerabilities in DirectX

DirectX is a multimedia-handling component that ships with all current versions of Windows. According to Microsoft, DirectX suffers from a couple of remote code execution vulnerabilities because it improperly parses certain multimedia files. The vulnerabilities differ technically, but share the same scope and impact. By enticing one of your users into opening a malicious media file, an attacker can exploit these vulnerabilities to execute code on your user’s computer, with your user’s privileges. If your user has local administrative privileges, the attacker gains complete control of your user’s machine. The only difference of note between these flaws involves which media file the attacker can use to exploit them. The potentially dangerous files that could trigger these flaws are:

  • AVI Video files (.avi)
  • WAV sound files (.wav)
  • SAMI files (.sami or .smi)

Microsoft rating: Critical.

MS07-068: Windows Media File Format Runtime Code Execution Vulnerability

The Windows Media File Format Runtime is a component Windows uses to play various Windows Media file types, such as WMV or WMA. The Windows Media File Format Runtime suffers from a vulnerability due to its inability to properly parse Advanced System Format (ASF) streaming media. By enticing one of your users into opening a specially crafted ASF file, or enticing them to a web site that contains an ASF stream, an attacker could exploit this vulnerability to execute code on your user’s computer, with your user’s privileges. As usual, if your user has local administrative privileges, attackers could leverage this flaw to take over your user’s computer.
Microsoft rating: Critical.

Solution Path

Microsoft has released patches for DirectX and Windows Media File Format Runtime to correct these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately.

MS07-064:

MS07-068:

For All WatchGuard Users:

You can mitigate the risk of these vulnerabilities by configuring your WatchGuard Firebox to block the following file types using its SMTP and HTTP proxies:

  • .avi
  • .wav
  • .smi
  • .sami
  • .asf

Keep in mind, blocking these file types will prevent your users from downloading them, whether the files are legitimate or malicious. Some organizations prefer to allow these media files into their network. Whether you decide to block these file types or not, applying Microsoft’s patches is the best solution

If you want to block these media files using your Firebox’s SMTP and HTTP proxies, refer to the links below:

Status:

Microsoft has released patches correcting these issues.

References:

Microsoft Security Bulletin MS07-068

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...