Archive of CERT general posting, CERT Advisory CA-2003-18 Integer Overflows in Microsoft Windows DirectX MIDI Library

26/07/03, CERT Advisory CA-2003-18 Integer Overflows in Microsoft Windows DirectX MIDI Library
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: CERT Advisory CA-2003-18 Integer Overflows in Microsoft Windows DirectX MIDI Library
From: CERT Advisory <cert-advisory@cert.org>
Date: Fri, 25 Jul 2003 14:49:29 -0400
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-subscribe: <mailto:Majordomo@cert.org?body=subscribe%20cert-advisory>
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Mail-from: From cert-advisory-owner@cert.org Sat Jul 26 02:37:46 2003
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----


CERT Advisory CA-2003-18 Integer Overflows in Microsoft Windows DirectX
MIDI Library

   Original issue date: July 25, 2003
   Last revised: --
   Source: CERT/CC

   A complete revision history is at the end of this file.


Systems Affected

     * Microsoft  Windows  systems  running DirectX (Windows 98, 98SE, NT
       4.0, NT 4.0 TSE, 2000, Server 2003)


Overview

   A  set  of  integer  overflows exists in a DirectX library included in
   Microsoft  Windows.  An  attacker  could exploit this vulnerability to
   execute arbitrary code or to cause a denial of service.


I. Description

   Microsoft  Windows  operating  systems include multimedia technologies
   called  DirectX  and  DirectShow.  From  Microsoft  Security  Bulletin
   MS03-030,   "DirectX  consists  of  a  set  of  low-level  Application
   Programming  Interfaces  (APIs)  that are used by Windows programs for
   multimedia support. Within DirectX, the DirectShow technology performs
   client-side audio and video sourcing, manipulation, and rendering."

   DirectShow  support  for MIDI files is implemented in a library called
   quartz.dll. This library contains two vulnerabilities:

     VU#561284 - Microsoft Windows DirectX MIDI library does not
                 adequately validate Text or Copyright parameters in
                 MIDI files

     VU#265232 - Microsoft Windows DirectX MIDI library does not
                 adequately validate MThd track values in MIDI files

   In  both  cases,  a specially crafted MIDI file could cause an integer
   overflow, leading to incorrect memory allocation and heap corruption.

   Any application that uses DirectX/DirectShow to process MIDI files may
   be  affected  by  this  vulnerability. Of particular concern, Internet
   Explorer  (IE)  uses  the  Windows  Media  Player  ActiveX control and
   quartz.dll  to  handle  MIDI  files  embedded  in  HTML  documents. An
   attacker  could  therefore  exploit this vulnerability by convincing a
   victim  to  view an HTML document, such as a web page or an HTML email
   message, that contains an embedded MIDI file. Note that in addition to
   IE,  a  number  of  applications,  including Outlook, Outlook Express,
   Eudora,  AOL,  Lotus  Notes, and Adobe PhotoDeluxe, use the WebBrowser
   ActiveX control to interpret HTML documents.

   Further  technical  details  are  available  in  eEye Digital Security
   advisory AD20030723. Common Vulnerabilities and Exposures (CVE) refers
   to these vulnerabilities as CAN-2003-0346.


II. Impact

   By  convincing  a  victim  to  access a specially crafted MIDI or HTML
   file,  an attacker could execute arbitrary code with the privileges of
   the  victim.  The attacker could also cause a denial of service in any
   application that uses the vulnerable functions in quartz.dll.


III. Solution

Apply a patch

   Apply  the  appropriate  patch  as  specified  by  Microsoft  Security
   Bulletin MS03-030.

Disable embedded MIDI files

   Change  the  Run  ActiveX  controls  and  plug-ins security setting to
   Disable  in the Internet zone and the zone(s) used by Outlook, Outlook
   Express,  and  any  other application that uses the WebBrowser ActiveX
   control to render HTML. This modification will prevent MIDI files from
   being automatically loaded from HTML documents. This workaround is not
   a  complete solution and will not prevent attacks that attempt to load
   MIDI files directly.

   Instructions  for  modifying IE security zone settings can be found in
   the CERT/CC Malicious Web Scripts FAQ.


Appendix A. Vendor Information

   This  appendix  contains information provided by vendors. When vendors
   report  new  information,  this section is updated and the changes are
   noted  in  the  revision  history. If a vendor is not listed below, we
   have not received their comments.

Microsoft

     Please see Microsoft Security Bulletin MS03-030.


Appendix B. References

     * CERT/CC Vulnerability Note VU#561284 -
       http://www.kb.cert.org/vuls/id/561284
     * CERT/CC Vulnerability Note VU#265232 -
       http://www.kb.cert.org/vuls/id/265232
     * eEye Digital Security advisory AD20030723 -
       http://www.eeye.com/html/Research/Advisories/AD20030723.html
     * Microsoft Security Bulletin MS03-030 -
       http://microsoft.com/technet/security/bulletin/MS03-030.asp
     * Microsoft Knowledge Base article 819696 -
       http://support.microsoft.com/default.aspx?scid=kb;en-us;819696
     _________________________________________________________________

   These  vulnerabilities were  researched and reported by  eEye  Digital
   Security.
     _________________________________________________________________

   Feedback can be directed to the author, Art Manion.
   ______________________________________________________________________

   This document is available from:
   http://www.cert.org/advisories/CA-2003-18.html
   ______________________________________________________________________


CERT/CC Contact Information

   Email: cert@cert.org
          Phone: +1 412-268-7090 (24-hour hotline)
          Fax: +1 412-268-6989
          Postal address:
          CERT Coordination Center
          Software Engineering Institute
          Carnegie Mellon University
          Pittsburgh PA 15213-3890
          U.S.A.

   CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /
   EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies
   during other hours, on U.S. holidays, and on weekends.

Using encryption

   We  strongly  urge you to encrypt sensitive information sent by email.
   Our public PGP key is available from
   http://www.cert.org/CERT_PGP.key

   If  you  prefer  to  use  DES,  please  call the CERT hotline for more
   information.

Getting security information

   CERT  publications  and  other security information are available from
   our web site
   http://www.cert.org/

   To  subscribe  to  the CERT mailing list for advisories and bulletins,
   send  email  to majordomo@cert.org. Please include in the body of your
   message

   subscribe cert-advisory

   *  "CERT"  and  "CERT  Coordination Center" are registered in the U.S.
   Patent and Trademark Office.
   ______________________________________________________________________

   NO WARRANTY
   Any  material furnished by Carnegie Mellon University and the Software
   Engineering  Institute  is  furnished  on  an  "as is" basis. Carnegie
   Mellon University makes no warranties of any kind, either expressed or
   implied  as  to  any matter including, but not limited to, warranty of
   fitness  for  a  particular purpose or merchantability, exclusivity or
   results  obtained from use of the material. Carnegie Mellon University
   does  not  make  any warranty of any kind with respect to freedom from
   patent, trademark, or copyright infringement.
   ______________________________________________________________________

   Conditions for use, disclaimers, and sponsorship information

   Copyright 2003 Carnegie Mellon University.


Revision History

   July 25, 2003: Initial release


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBPyF6V2jtSoHZUTs5AQFGtgP/VJsEVZ1blK04pZhjSIlJuPJJg1PU4Xwi
/lvJFdpvkqKrEH27NHBkfJGN/rSs7kinSq6dEsJeenjb3rcDQMd/VdFEm83cF51/
NDyMt4osvtXveYSR1oorbMbSVQ4tF5yItsOchRfZsfigyk3tvzPA1kawuWBxy2KZ
Gmjs9RLgmxI=
=3ICC
-----END PGP SIGNATURE-----



Previous message sorted by date: CERT Advisory CA-2003-17 Exploit available for for the Cisco IOS Interface
Next message sorted by date: CERT Advisory CA-2003-19 Exploitation of Vulnerabilities in Microsoft RPC Interface
Previous message sorted by thread: CERT Advisory CA-2003-17 Exploit available for for the Cisco IOS Interface
Next message by thread: CERT Advisory CA-2003-19 Exploitation of Vulnerabilities in Microsoft RPC Interface
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Jan 2004