Short Name |
HTTP:STC:DL:MPEG4-3IVX-FILE |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
3ivx MPEG-4 MP4 File Handling Stack Overflow |
Release Date |
2010/10/19 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in 3ivx MPEG-4. It is due to improper handling of MP4 files by the 3ivx MPEG-4 codec plugin. A remote attacker can exploit this by enticing the target user to open crafted MP4 file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged in user. In a simple attack, the affected media player application can terminate when the malicious file is opened. In a sophisticated attack, where the malicious user is successful in injecting and executing supplied code, the behavior of the system is dependent on the nature of the injected code. It is executed in the security context of the currently logged in user.
3ivx MPEG-4 is prone to multiple stack-based buffer-overflow issues because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts likely result in denial-of-service conditions. 3ivx MPEG-4 5.0.1 is vulnerable; other versions may also be affected. NOTE: This BID originally listed Windows Media Player as vulnerable, but has been updated to reflect the fact that the issues reside in 3ivx MPEG-4.