Operating System:

[WIN]

Published:

12 March 2014

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0316
         Vulnerability in Microsoft DirectShow Could Allow Remote
                         Code Execution (2929961)
                               12 March 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft DirectShow
Publisher:         Microsoft
Operating System:  Windows XP
                   Windows Server 2003
                   Windows Vista
                   Windows Server 2008
                   Windows 7
                   Windows Server 2008 R2
                   Windows 8
                   Windows Server 2012
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0301  

Original Bulletin: 
   http://technet.microsoft.com/en-us/security/bulletin/ms14-013

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS14-013 - Critical
Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (2929961)

Published Date: March 11, 2014

Version: 1.0

General Information

Executive Summary 

This security update resolves a privately reported vulnerability in Microsoft 
Windows. The vulnerability could allow remote code execution if a user opens a 
specially crafted image file. An attacker who successfully exploited this 
vulnerability could gain the same user rights as the current user. Users whose 
accounts are configured to have fewer user rights on the system could be less 
impacted than users who operate with administrative user rights.

This security update is rated Critical for all supported editions of Windows 
XP, Windows Server 2003, Windows Vista, Windows Server 2008 (except 
Itanium-based editions), Windows 7, Windows Server 2008 R2 (except 
Itanium-based editions), Windows 8, Windows Server 2012, Windows 8.1, and 
Windows Server 2012 R2.

Affected Software

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8 and Windows 8.1
Windows Server 2012 and Windows Server 2012 R2

Vulnerability Information

DirectShow Memory Corruption Vulnerability - CVE-2014-0301

A remote code execution vulnerability exists in the way that Microsoft 
DirectShow parses specially crafted JPEG image files. The vulnerability could 
allow remote code execution if a user opens a specially crafted image file. An 
attacker who successfully exploited this vulnerability could gain the same 
user rights as the current user. Users whose accounts are configured to have 
fewer user rights on the system could be less impacted than users who operate 
with administrative user rights.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=QFMQ
-----END PGP SIGNATURE-----