Microsoft Media Player Audio Sampling Rate Memory Corruption (MS08-054; CVE-2008-2253)
|Check Point Reference:||CPAI-2012-267|
|Source:||Microsoft Security Bulletin: MS08-054|
|Protection Provided by:||
Who is Vulnerable?
Microsoft Windows Media Player 11
A remote code execution vulnerability has been reported in Microsoft Windows Media Player 11.
The vulnerability is due to a buffer overflow condition in Windows Media Player 11 that fails to properly handle specially crafted audio-only files. A remote attacker could trigger this flaw by convincing a victim to open a specially crafted WSX file. Successful exploitation of this issue would allow the attacker to take complete control of the affected system.
IPS will detect and block the transferring of specially crafted WSX files over HTTP.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.
Security Gateway R75 / R71 / R70
How Can I Protect My Network?
- In the IPS tab, click Protections and find the Microsoft Media Player Audio Sampling Rate Memory Corruption (MS08-054) protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries:
Attack Name: RTSP Enforcement Violation
Attack Information: Microsoft Media Player Audio Sampling Rate Memory Corruption (MS08-054)