CVE-2010-0250 (CNNVD-201002-103)
中文标题:
Microsoft DirectX DirectShow AVI文件堆缓冲区溢出漏洞
英文标题:
Heap-based buffer overflow in DirectShow in Microsoft DirectX, as used in the AVI Filter on Windows ...
漏洞描述
中文描述:
Microsoft DirectX是Windows操作系统中的一项功能,流媒体在玩游戏或观看视频时通过这个功能支持图形和声音。 Microsoft DirectX的DirectShow中存在基于堆的缓冲区溢出漏洞。远程攻击者可借助带有未明视频流中特制长度字段的AVI文件执行任意代码,该文件不能被RLE视频解压缩器正确处理。 该漏洞位于以下版本:基于Windows 2000 SP4,Windows XP SP2和SP3,基于Windows Server 2003 SP2版本中的AVI过滤器,以及基于Windows 2000 SP4,Windows XP SP2和SP3,Windows Server 2003 SP2,Windows Vista Gold,SP1和SP2,Windows Server 2008 Gold,SP2和R2,Windows 7中的Quartz中。
英文描述:
Heap-based buffer overflow in DirectShow in Microsoft DirectX, as used in the AVI Filter on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2, and in Quartz on Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, allows remote attackers to execute arbitrary code via an AVI file with a crafted length field in an unspecified video stream, which is not properly handled by the RLE video decompressor, aka "DirectShow Heap Overflow Vulnerability."
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| microsoft | windows_7 | - | - | - |
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | * | - | - |
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
|
| microsoft | windows_server_2008 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2008:-:-:x32:*:*:*:*:*
|
| microsoft | windows_server_2008 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*
|
| microsoft | windows_vista | * | - | - |
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
|
| microsoft | windows_vista | - | - | - |
cpe:2.3:o:microsoft:windows_vista:-:-:x64:*:*:*:*:*
|
| microsoft | windows_xp | * | - | - |
cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*
|
| microsoft | windows_xp | - | - | - |
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2010-0250 |
2025-11-11 15:18:14 | 2025-11-11 07:33:06 |
| NVD | nvd_CVE-2010-0250 |
2025-11-11 14:53:24 | 2025-11-11 07:41:54 |
| CNNVD | cnnvd_CNNVD-201002-103 |
2025-11-11 15:09:08 | 2025-11-11 07:49:41 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201002-103
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 8
- data_sources: ['cve'] -> ['cve', 'nvd']