|
|
|
|
| |
Credit:
The information has been provided by Moritz Jodeit.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-147/
|
| |
Vulnerable Systems:
* Microsoft Windows XP
User interaction is required in that a target must open a malicious media file or visit a malicious page. The specific flaw exists within the codec responsible for parsing layer 3 MPEG audio streams. By providing invalid values within the stream, heap memory can be easily corrupted. This could be leveraged by an attacker to execute remote code under the context of the user running the application.
Patch Availability:
Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx
CVE Information:
CVE-2010-1882
Disclosure Timeline:
2010-04-06 - Vulnerability reported to vendor
2010-08-10 - Coordinated public release of advisory
|
|
|
|
|