[prev in list] [next in list] [prev in thread] [next in thread] 

List:       patchmanagement
Subject:    vuln in DirectShow via malformed Quicktime file
From:       "Eric Schultze" <eric.schultze () shavlik ! com>
Date:       2009-05-28 21:11:08
Message-ID: B8C751C817821D4F87F01719532ABAF606C00094 () Exchange3 ! shavlik ! com
[Download RAW message or body]

Windows systems (pre-Vista) are vulnerable to exploitation if viewing a
specially crafted Quicktime file.  

Microsoft advisory:
http://www.microsoft.com/technet/security/advisory/971778.mspx

More info
* Microsoft knowledge base article 971778 -
http://support.microsoft.com/kb/971778 
(includes a way to implement a workaround)
	
* Microsoft Security Response Center (MSRC) Blog:
http://blogs.technet.com/msrc


* Microsoft Malware Protection Center (MMPC) Blog:
http://blogs.technet.com/mmpc


* Security Research & Defense (SRD) Blog: http://blogs.technet.com/srd/




---
When posting or replying to messages on this list, please send all
emails in plain text format.  HTML formatted messages will not be accepted.

PatchManagement.org is hosted by Shavlik Technologies

To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.org
If you are unable to unsubscribe via this email address, please email
owner-patchmanagement@patchmanagement.org


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic