First published: Fri Jul 25 2003(Updated: )
Multiple integer overflows in a Microsoft Windows DirectX MIDI library (QUARTZ.DLL) allow remote attackers to execute arbitrary code via a MIDI (.mid) file with (1) large length for a Text or Copyright string, or (2) a large number of tracks, which leads to a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft DirectX | =5.2 | |
Microsoft DirectX | =6.1 | |
Microsoft DirectX | =7.0 | |
Microsoft DirectX | =7.0a | |
Microsoft DirectX | =8.1 | |
Microsoft DirectX | =9.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0346 is considered to be a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2003-0346, it is recommended to apply the latest security patches for all affected versions of Microsoft DirectX.
CVE-2003-0346 affects Microsoft DirectX versions 5.2, 6.1, 7.0, 7.0a, 8.1, and 9.0a.
Yes, CVE-2003-0346 can be exploited by an attacker using a specially crafted MIDI file to trigger the vulnerability.
Exploitation of CVE-2003-0346 can lead to arbitrary code execution, potentially allowing attackers to compromise the affected system.