Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution
Description: This security update resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerabilities by correcting the manner in which AVI headers are processed and correcting the manner in which AVI data is validated.
Update type: Critical
Release date: August 11, 2009
Applies to: All versions
Knowledge base: http://support.microsoft.com/kb/971557
- Malformed AVI Header Vulnerability – CVE-2009-1545
- AVI Integer Overflow Vulnerability – CVE-2009-1546
For more information on this issue, including potential causes, workarounds, and resolutions, see: Microsoft KB Article KB971557.