Critical Vulnerability Discovered in Microsoft Windows Media File Handling
( Microsoft Security Bulletin MS13-011, CVE-2013-0077 )
A critical vulnerability has been reported in the way that Windows handles media content. Successful exploitation of this issue could allow a remote attacker to execute arbitrary code on a targeted system. The Check Point IPS Software Blade provides immediate protection at the network level for unpatched systems.
The vulnerability is due to an error in the way that the DirectShow subsystem in Windows handles media files. An attacker could either entice a targeted user to open a link to a maliciously crafted media file on a website, or send the file to the user via email. Successful exploitation could allow the attacker to take control of the targeted system with the rights and privileges of the user's security context.
This issue affects the following products:
- Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for Itanium-based Systems Service Pack 2
Check Point recommends deploying the update described in MS13-011 as soon as is practical. In the meantime, the Check Point IPS Software Blade provides protection at the network level for unpatched systems. For more information, see CPAI-2013-1265.
Last Updated: 21-Feb-2013