Rule

--
Sid
16602

--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in Windows 2003 server.

--
Impact:
Denial of Service. Information disclosure. Loss of integrity. Complete admin access.

--
Detailed Information:
Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability."

--
Affected Systems:
Microsoft Windows 2008 Gold, SP2
Microsoft Windows 2003 server SP2
Microsoft Windows 2000 SP4
Microsoft Windows XP SP2, SP3
Microsoft Windows Vista Gold, SP1, SP2

--
Attack Scenarios:


--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Vulnerability Research Team
This document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.
For more information see http://nvd.nist.gov/

--
Additional References:

NIST CVE-2008-0015:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0015
  
--
