First published: Wed Apr 15 2009(Updated: )
Use-after-free vulnerability in DirectShow in Microsoft DirectX 8.1 and 9.0 allows remote attackers to execute arbitrary code via an MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory that is later accessed, aka "MJPEG Decompression Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft DirectX | =8.1 | |
Microsoft DirectX | =9.0 | |
Microsoft DirectX | =9.0a | |
Microsoft DirectX | =9.0b | |
Microsoft DirectX | =9.0c | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0084 is considered to have a critical severity level due to its potential to allow remote code execution.
The best way to fix CVE-2009-0084 is to apply the latest security updates and patches provided by Microsoft.
CVE-2009-0084 affects Microsoft DirectX versions 8.1 and 9.0, along with certain versions of Windows.
Yes, CVE-2009-0084 can be exploited remotely via a specially crafted MJPEG file or video stream.
If exploited, CVE-2009-0084 can lead to arbitrary code execution on the affected system.