Vous êtes ici: index » cert » avis


Par défaut, cette page vous affichera les derniers messages envoyés par le CERT RENATER à la communauté. Vous pouvez affiner par année ou par type de message. Si aucun critère n'est précisé, seuls les derniers messages sont affichés

Date : Wed, 10 Mar 2010 10:29:10 +0100
Type : VULN
Sujet : CERT-Renater : 2010/VULN082 (Microsoft: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution)
====================================================================                                   CERT-Renater

                        Note d'Information No. 2010/VULN082

DATE                      : 10/03/2010


OPERATING SYSTEM(S)       : Windows XP, Windows Vista, Windows 7 running Windows Movie Maker.


Microsoft Security Bulletin MS10-016 - Important

Vulnerability in Windows Movie Maker Could Allow Remote Code Execution

Version: 1.0

General Information

Executive Summary

  This security update addresses a privately reported vulnerability in Windows
  Movie Maker and Microsoft Producer 2003. Windows Live Movie Maker, which is
  available for Windows Vista and Windows 7, is not affected by this
  vulnerability. The vulnerability could allow remote code execution if an
  attacker sent a specially crafted Movie Maker or Microsoft Producer project
  file and persuaded the user to open the specially crafted file. Users whose
  accounts are configured to have fewer user rights on the system could be
  less impacted than users who operate with administrative user rights.

  This security update is rated Important for Windows Movie Maker 2.1, Windows
  Movie Maker 2.6, Windows Movie Maker 6.0, and Microsoft Producer 2003. For
  more information, see the subsection, Affected and Non-Affected Software, in
  this section.

  The security update addresses the vulnerability by changing the way that
  Windows Movie Maker parses project files. There is no security update
  available for Microsoft Producer 2003 at this time. Customers can mitigate
  the impact to systems with Microsoft Producer 2003 by applying the
  automated solution to remove the Microsoft Producer file associations using
  the Fix it found in Microsoft Knowledge Base Article 975561, and by
  applying the workarounds in this bulletin. For more information about the
  vulnerability, see the Frequently Asked Questions (FAQ) subsection for the
  specific vulnerability entry under the next section, Vulnerability

  Recommendation. The majority of customers have automatic updating enabled
  and will not need to take any action because this security update will be
  downloaded and installed automatically. Customers who have not enabled
  automatic updating need to check for updates and install this update
  manually. For information about specific configuration options in automatic
  updating, see Microsoft Knowledge Base Article 294871.

  For administrators and enterprise installations, or end users who want to
  install this security update manually, Microsoft recommends that customers
  apply the update at the earliest opportunity using update management
  software, or by checking for updates using the Microsoft Update service.

  See also the section, Detection and Deployment Tools and Guidance, later
  in this bulletin.

  Known Issues. Microsoft Knowledge Base Article 975561 documents the
  currently known issues that customers may experience when installing this
  security update. The article also documents recommended solutions for
  these issues.

Affected Software

  Windows XP Service Pack 2 and Windows XP Service Pack 3 - Movie Maker 2.1
  Windows XP Professional x64 Edition Service Pack 2 - Movie Maker 2.1
  Windows Vista, Windows Vista Service Pack 1, and Windows Vista
    Service Pack 2 - Movie Maker 2.6 and 6.0
  Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1,
    and Windows Vista x64 Edition Service Pack 2 - Movie Maker 2.6 and 6.0
  Windows 7 for 32-bit Systems - Movie Maker 2.6
  Windows 7 for x64-based Systems - Movie Maker 2.6

Vulnerability Information

Movie Maker and Producer Buffer Overflow Vulnerability - CVE-2010-0265

  A remote code execution vulnerability exists in the way that Windows
  Movie Maker and Microsoft Producer 2003 handle specially crafted project
  files. An attacker who successfully exploited this vulnerability could
  take complete control of an affected system. An attacker could then
  install programs; view,change, or delete data; or create new accounts
  with full user rights.


          Les serveurs de référence du CERT-Renater
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +