===================================================================== CERT-Renater Note d'Information No. 2010/VULN082 _____________________________________________________________________ DATE : 10/03/2010 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Windows XP, Windows Vista, Windows 7 running Windows Movie Maker. ====================================================================== KB975561 http://www.microsoft.com/technet/security/bulletin/ms10-016.mspx ______________________________________________________________________ Microsoft Security Bulletin MS10-016 - Important Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (975561) Version: 1.0 General Information Executive Summary This security update addresses a privately reported vulnerability in Windows Movie Maker and Microsoft Producer 2003. Windows Live Movie Maker, which is available for Windows Vista and Windows 7, is not affected by this vulnerability. The vulnerability could allow remote code execution if an attacker sent a specially crafted Movie Maker or Microsoft Producer project file and persuaded the user to open the specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Important for Windows Movie Maker 2.1, Windows Movie Maker 2.6, Windows Movie Maker 6.0, and Microsoft Producer 2003. For more information, see the subsection, Affected and Non-Affected Software, in this section. The security update addresses the vulnerability by changing the way that Windows Movie Maker parses project files. There is no security update available for Microsoft Producer 2003 at this time. Customers can mitigate the impact to systems with Microsoft Producer 2003 by applying the automated solution to remove the Microsoft Producer file associations using the Fix it found in Microsoft Knowledge Base Article 975561, and by applying the workarounds in this bulletin. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871. For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update at the earliest opportunity using update management software, or by checking for updates using the Microsoft Update service. See also the section, Detection and Deployment Tools and Guidance, later in this bulletin. Known Issues. Microsoft Knowledge Base Article 975561 documents the currently known issues that customers may experience when installing this security update. The article also documents recommended solutions for these issues. Affected Software Windows XP Service Pack 2 and Windows XP Service Pack 3 - Movie Maker 2.1 Windows XP Professional x64 Edition Service Pack 2 - Movie Maker 2.1 Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2 - Movie Maker 2.6 and 6.0 Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2 - Movie Maker 2.6 and 6.0 Windows 7 for 32-bit Systems - Movie Maker 2.6 Windows 7 for x64-based Systems - Movie Maker 2.6 Vulnerability Information Movie Maker and Producer Buffer Overflow Vulnerability - CVE-2010-0265 A remote code execution vulnerability exists in the way that Windows Movie Maker and Microsoft Producer 2003 handle specially crafted project files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view,change, or delete data; or create new accounts with full user rights. ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================