Vulnerability Note VU#228561

Microsoft Indeo video codecs contain multiple vulnerabilities

Original Release date: 14 Dec 2009 | Last revised: 28 Mar 2012

Overview

The Indeo video codecs that are provided by Microsoft Windows contain multiple vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

Indeo is a video codec that was developed by Intel and Microsoft. Multiple versions of the Indeo video codec are included with several versions of Windows, including Windows 2000, XP, and Server 2003. Each of the Indeo codecs that are provided with Microsoft Windows contains multiple vulnerabilities that can result in memory corruption. The vulnerable video codecs can be reached through a variety of APIs, including Video for Windows (VfW) or the more recent DirectShow API. Any application that uses these APIs may be vulnerable. For example, Windows Media Player, Internet Explorer, and Windows Explorer can be used as attack vectors.

Impact

By convincing a user to process specially-crafted Indeo video content, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. This can occur by viewing a web page with Internet Explorer, opening a media file with Windows Media Player, or simply by selecting a media file in Windows Explorer.

Solution

An official patch is not available to remediate this vulnerability. Please consider the following workarounds:

Apply an update

This vulnerability is mitigated by the updates specified in Microsoft Security Advisory (954157), which have been distributed through Microsoft's automatic updates system. The updates are provided by Microsoft Support article KB955759, which sets the AppCompat values to prevent Internet Explorer and Windows Media Player from using the Indeo codecs, and Microsoft Support article KB976138, which updates quartz.dll on Windows 2000 systems to limit the zones that can use the Indeo codecs (Windows XP and later already have the zone restriction). Note that even after installing these updates, some attack vectors, such as Windows Explorer, will still be open.

Unregister the Indeo codecs

Microsoft Support article KB954157 provides a "Fix it" utility to automatically unregister the Indeo codec files. This will prevent the vulnerable codecs from being used by any application unless the codecs are re-registered. This mitigation is more comprehensive than the above updates; however, it may negatively impact applications that require an Indeo codec.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Intel CorporationAffected22 Jun 200914 Dec 2009
Microsoft CorporationAffected12 Jun 200914 Dec 2009
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 9.0 AV:N/AC:M/Au:N/C:C/I:C/A:P
Temporal 7.7 E:POC/RL:W/RC:C
Environmental 7.7 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Credit

This vulnerability was reported by Will Dormann of the CERT/CC.

This document was written by Will Dormann.

Other Information

  • CVE IDs: Unknown
  • Date Public: 08 Dec 2009
  • Date First Published: 14 Dec 2009
  • Date Last Updated: 28 Mar 2012
  • Severity Metric: 9.56
  • Document Revision: 25

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.