Summary
Microsoft DirectShow's QuickTime Movie Parser Filter in quartz.dll on affected DirectX versions mishandles crafted QuickTime media files. An attacker can lure a user to open a malicious QuickTime file or visit a web page that serves it; no authentication is needed, but user interaction is required. Successful exploitation can execute arbitrary code with the logged-on user's privileges and may lead to full system compromise.
Why Emergency Fix?
6/6Exploitation Details
Execute arbitrary code with the privileges of the logged-on user; admin sessions can yield full system control.
RCE (Remote Code Execution)Affected Software
| Product | Affected Versions |
|---|---|
| DirectX | 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2/SP3, and Windows Server 2003 SP2 |
Microsoft DirectX is a set of Windows multimedia APIs and runtime components used for graphics, video, audio, and media playback in applications and games.
Affected ComponentQuickTime Movie Parser Filter in DirectShow (quartz.dll) that parses crafted QuickTime media files.
QuickTime Movie Parser Filter in DirectShow (quartz.dll) that parses crafted QuickTime media files.
Disable parsing of QuickTime content in quartz.dll by removing the QuickTime parser CLSID registration, as described by Microsoft. This blocks the known attack vector but can break QuickTime playback.
Disable parsing of QuickTime content in quartz.dll by removing the QuickTime parser CLSID registration, as described by Microsoft. This blocks the known attack vector but can break QuickTime playback.
Apply the Microsoft security update delivered through MS09-028 for the affected DirectX release on supported Windows systems.
Apply the Microsoft security update delivered through MS09-028 for the affected DirectX release on supported Windows systems.
Not available
Probability of exploitation in the next 30 days
Worse than 99% of all CVEs
No known threat actors
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Affected Software (CPE) (17)
- •cpe:2.3:a:microsoft:directx:7.0:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:7.0a:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:7.1:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:8.1:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:8.1b:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:9.0:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:9.0a:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:9.0b:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:directx:9.0c:*:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| nvd.nist.gov | CVE-2009-1537 Detail |
| learn.microsoft.com | Microsoft Security Advisory 971778 |
| learn.microsoft.com | Microsoft Security Bulletin MS09-028 |
| www.microsoft.com | Exploit:Win32/CVE-2009-1537 |
| www.snort.org | Rule Document 1:23565 |
| www.cisa.gov | Microsoft Updates for Multiple Vulnerabilities |
| www.tenable.com | CVE-2009-1537 |
Priority History
Initial analysis