===================================================================== CERT-Renater Note d'Information No. 2014/VULN065 _____________________________________________________________________ DATE : 12/03/2014 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Windows versions XP, Server 2003, Vista, Server 2008, 7, 8, 8.1, Server 2012 runnning Microsoft DirectShow. ====================================================================== KB2929961 http://technet.microsoft.com/en-us/security/bulletin/ms14-013 ______________________________________________________________________ Microsoft Security Bulletin MS14-013 - Critical Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (2929961) Published Date: March 11, 2014 Version: 1.0 General Information Executive Summary This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted image file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Critical for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 (except Itanium-based editions), Windows 7, Windows Server 2008 R2 (except Itanium-based editions), Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2. Affected Software Windows XP Windows Server 2003 Windows Vista Windows Server 2008 Windows 7 Windows Server 2008 R2 Windows 8 and Windows 8.1 Windows Server 2012 and Windows Server 2012 R2 Vulnerability Information DirectShow Memory Corruption Vulnerability - CVE-2014-0301 A remote code execution vulnerability exists in the way that Microsoft DirectShow parses specially crafted JPEG image files. The vulnerability could allow remote code execution if a user opens a specially crafted image file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. ========================================================= Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================