![]() ![]() If the file was embedded in a page, the vulnerability could be exploited when a user visits the Web page. ![]() If the file was hosted on a Web site or on a network share, the user would have to open the specially crafted file. These buffer overruns may cause a security vulnerability because a malicious user could try to exploit these flaws and run code in the security context of the logged on user.Īn attacker might try to exploit this vulnerability by creating a specially crafted MIDI file that is designed to exploit this vulnerability and then host this file on a Web site or on a network share or send it by means of an HTML e-mail message. There are two buffer overruns that have the same effects in the function that is used by DirectShow to check parameters in a Musical Instrument Digital Interface (MIDI) file. The DirectShow technology in DirectX performs client-side audio and video sourcing, manipulation, and rendering. DirectX is made up of a set of low-level Application Programming Interfaces (APIs) that is used by Windows programs for multimedia support.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |