9.3
CVE-2009-0084
- EPSS 62.41%
- Published 15.04.2009 08:00:00
- Last modified 09.04.2025 00:30:58
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Use-after-free vulnerability in DirectShow in Microsoft DirectX 8.1 and 9.0 allows remote attackers to execute arbitrary code via an MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory that is later accessed, aka "MJPEG Decompression Vulnerability."
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Directx Version9.0
Microsoft ≫ Windows 2000 Updatesp4
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Directx Version9.0a
Microsoft ≫ Windows 2000 Updatesp4
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Directx Version9.0b
Microsoft ≫ Windows 2000 Updatesp4
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Directx Version9.0c
Microsoft ≫ Windows 2000 Updatesp4
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Server 2003
Microsoft ≫ Windows Server 2003 Updatesp1
Microsoft ≫ Windows Server 2003 Updatesp1 Editionitanium
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Xp Editionpro_x64
Microsoft ≫ Windows Xp Updatesp2
Microsoft ≫ Windows Xp Updatesp2 Editionpro_x64
Microsoft ≫ Windows Xp Updatesp3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 62.41% | 0.983 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.