Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft DirectX buffer overflow
Published:19.07.2007
Source:
SecurityVulns ID:7951
Type:library
Threat Level:
5/10
Description:Buffer overflow on compressed TGA images parsing.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : DirectX 9.0
 MICROSOFT : Windows Vista
CVE:CVE-2006-4183 (Heap-based buffer overflow in Microsoft DirectX SDK (February 2006) and probably earlier, including 9.0c End User Runtimes, allows context-dependent attackers to execute arbitrary code via a crafted Targa file with a run-length-encoding (RLE) compression that produces more data than expected when decoding.)
Original documentdocumentReversemode, [Reversemode Advisory] Microsoft DirectX RLE Compressed Targa Image File Heap Overflow (19.07.2007)
 documentIDEFENSE, iDefense Security Advisory 07.18.07: Microsoft DirectX RLE Compressed Targa Image File Heap Overflow (19.07.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod