First published: Tue Jun 08 2010(Updated: )
Unspecified vulnerability in Quartz.dll for DirectShow; Windows Media Format Runtime 9, 9.5, and 11; Media Encoder 9; and the Asycfilt.dll COM component allows remote attackers to execute arbitrary code via a media file with crafted compression data, aka "Media Decompression Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft DirectX | =9.0a | |
Microsoft DirectX | =9.0b | |
Microsoft DirectX | =9.0c | |
Microsoft DirectX | =9.0 | |
Microsoft Windows Media Format Runtime | =9 | |
Microsoft Windows Media Format Runtime | =9.5 | |
Microsoft Windows Media Format Runtime | =9.5 | |
Microsoft Windows Media Format Runtime | =11 | |
Microsoft Windows Media Encoder | =9 | |
Microsoft Windows Media Encoder | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1879 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2010-1879, update affected Microsoft DirectX and Windows Media formats to the latest versions provided by Microsoft.
CVE-2010-1879 affects Microsoft DirectX versions 9.0a, 9.0b, 9.0c, and Windows Media Format Runtime versions 9, 9.5, and 11.
Yes, CVE-2010-1879 can be exploited remotely through specially crafted media files.
Symptoms of an exploit for CVE-2010-1879 could include unexpected application crashes or unauthorized command execution.