Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:STREAM:MAL-MEDIA

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Media Player Malformed Media File

Release Date

2012/02/13

Update Number

2081

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Media Player Malformed Media File


This signature detects attempts to exploit a known flaw in Microsoft Media Player. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user.

Extended Description

Microsoft Windows is prone to a remote buffer-overflow vulnerability when handling a specially crafted media file. An attacker can exploit this issue by enticing an unsuspecting user to view a webpage containing malicious content or to open a malicious media file. Successful exploits will allow the attacker to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.

Affected Products

  • Avaya Aura Conferencing 6.0 Standard
  • Microsoft Windows 7 for 32-bit Systems SP1
  • Microsoft Windows 7 for 32-bit Systems
  • Microsoft Windows 7 for x64-based Systems SP1
  • Microsoft Windows 7 for x64-based Systems
  • Microsoft Windows 7 Home Premium - Sp1 X32
  • Microsoft Windows 7 Home Premium - Sp1 X64
  • Microsoft Windows 7 Home Premium
  • Microsoft Windows Server 2008 for 32-bit Systems SP2
  • Microsoft Windows Server 2008 for 32-bit Systems
  • Microsoft Windows Server 2008 for Itanium-based Systems SP2
  • Microsoft Windows Server 2008 for Itanium-based Systems
  • Microsoft Windows Server 2008 for x64-based Systems SP2
  • Microsoft Windows Server 2008 for x64-based Systems
  • Microsoft Windows Server 2008 R2 for x64-based Systems SP1
  • Microsoft Windows Server 2008 R2 Itanium SP1
  • Microsoft Windows Server 2008 R2 Itanium
  • Microsoft Windows Server 2008 R2 x64 SP1
  • Microsoft Windows Server 2008 R2 x64
  • Microsoft Windows Vista Business 64-bit edition SP1
  • Microsoft Windows Vista Business 64-bit edition Sp1 X64-Enterprise
  • Microsoft Windows Vista Business 64-bit edition Sp1 X64-Home Premium
  • Microsoft Windows Vista Business 64-bit edition Sp1 X64-Ultimate
  • Microsoft Windows Vista Business 64-bit edition SP2
  • Microsoft Windows Vista Business 64-bit edition X64-Enterprise
  • Microsoft Windows Vista Business 64-bit edition X64-Ultimate
  • Microsoft Windows Vista Business 64-bit edition
  • Microsoft Windows Vista Enterprise 64-bit edition SP1
  • Microsoft Windows Vista Enterprise 64-bit edition SP2
  • Microsoft Windows Vista Enterprise 64-bit edition
  • Microsoft Windows Vista Home Basic 64-bit edition SP1
  • Microsoft Windows Vista Home Basic 64-bit edition Sp1 X64
  • Microsoft Windows Vista Home Basic 64-bit edition SP2
  • Microsoft Windows Vista Home Basic 64-bit edition Sp2 X64
  • Microsoft Windows Vista Home Basic 64-bit edition
  • Microsoft Windows Vista Home Premium 64-bit edition SP1
  • Microsoft Windows Vista Home Premium 64-bit edition SP2
  • Microsoft Windows Vista Home Premium 64-bit edition
  • Microsoft Windows Vista Ultimate 64-bit edition SP1
  • Microsoft Windows Vista Ultimate 64-bit edition SP2
  • Microsoft Windows Vista Ultimate 64-bit edition
  • Microsoft Windows Vista x64 Edition SP1
  • Microsoft Windows Vista x64 Edition SP2
  • Microsoft Windows Vista x64 Edition

References

  • BugTraq: 51913
  • CVE: CVE-2012-0150

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out