- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Microsoft DirectX RLE Compressed Targa Image File Heap Overflow
Vulnerability
------------------------------------------------------------------------
SUMMARY
Microsoft <http://msdn.microsoft.com/directx/ > DirectX is "a collection
of APIs for easily handling tasks related to game programming on the
Microsoft Windows operating system".
Exploitation of an input validation vulnerability in Microsoft Corp.'s
DirectX library could allow an attacker to execute arbitrary code in the
context of the current user.
DETAILS
Vulnerable Systems:
* Microsoft's DirectX SDK (February 2006).
* DirectX End User Runtimes (February 2006).
* It is suspected that previous versions are also affected, including the
DirectX 9.0c End User Runtimes.
The vulnerability specifically exists in the way RLE compressed Targa
format image files are opened. The Targa format allows multiple color
depths and image storage options, depths and image storage options, and
includes the ability to use run-length encoding (RLE), compression on the
image data. This is a compression method which finds a 'run' of the pixels
the same color and instead of storing the value multiple times, encodes
the number of times to repeat one value. For example, instead of storing
'AAAAAAAA', it may encode that into 'store "A" 8 times'. The buffer
allocated for the image data is based on the width, height and color depth
stored in the image, but when decoding this type of file, no checks
against writing past the end of the buffer are performed. If the encoding
specifies more data than has been allocated, a controlled heap overflow
can occur.
Exploitation could allow a remote attacker to execute arbitrary code in
the context of the affected application.
If the DirectX SDK is installed on a system, this function is used to
display a preview in Windows Explorer's 'Details' pane, causing Explorer
to become vulnerable.
The DirectX End User Runtimes are often bundled with games or
applications. Vectors potentially affecting users with either the SDK or
the End User Runtime include online games and applications where graphics
files are be downloaded from a remote server and used as a texture.
Vendor Status:
Microsoft reports that they addressed this vulnerability in the October
2006 SDK and End-User Runtime releases. iDefense has confirmed that this
vulnerability no longer exists in the June 2007 release.
CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4183>
CVE-2006-4183
Disclosure Timeline:
* 08/16/2006 - Initial vendor notification
* 10/05/2006 - Initial vendor response
* 10/05/2006 - Second vendor notification
* 07/18/2007 - Public disclosure
ADDITIONAL INFORMATION
The information has been provided by iDefense.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=562>
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=562
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
No comments:
Post a Comment