First published: Thu Jun 12 2008(Updated: )
Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the "MJPEG Decoder Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows NT | =xp-sp3 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft DirectX | =9.0 | |
Microsoft DirectX | =7.0 | |
Microsoft DirectX | =8.1 | |
Microsoft Windows NT | =2008 | |
Microsoft Windows NT | =2008 | |
Microsoft Windows NT | =2008 | |
Microsoft Windows Vista | ||
Microsoft DirectX | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0011 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2008-0011, users should install the latest updates for Microsoft DirectX and any relevant Windows patches.
CVE-2008-0011 affects Microsoft DirectX versions 8.1 to 9.0c on various Windows operating systems including XP, Vista, and Server 2003.
CVE-2008-0011 can allow attackers to execute arbitrary code by sending a crafted MJPEG stream in specific video file formats.
No, using software vulnerable to CVE-2008-0011 poses significant security risks, and it is crucial to apply mitigation measures.