Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Direct-X Under Attack

May 29, 2009 By Michael Kavka Leave a Comment

It seems that a vulnerability in Direct X’s Direct Show subsystem is coming under attack. Now the vulnerability allows execution of code, but only as the logged on user, which means if you are smart, then the normal user account does not have admin rights, and code executed through this vulnerability won’t be able to do as much.

The thing that makes this so major, even though it doesn’t automatically grant admin rights, is the fact that Direct X is used for a lot of multimedia applications. In fact most games use either Direct X or Open GL for rendering. Now add on that the issue is with a Quicktime subroutine in Direct Show, and that even if you have Quicktime installed on your system, the Direct X exploit Can still be access, and you have the makings of a huge issue.

Now the other thing that is interesting is that this only affects Windows 2000, 2003 and XP. Vista and 2008 are not affected, or at least have not been shown to be affected by this vulnerability.

Workarounds and more information is available in the actual Microsoft Security Advisory for this vulnerability.

Filed Under: Computers, Security Tagged With: Advisory 971778, Direct Show, Direct X, Microsoft, Quicktime, Remote Execution, Security, Security Holes, Vulnerability

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

RSS Taggart Institute Intel Feed

  • Lawsuit Accuses a16z of Turning Roblox Into a School Shooter's Playground October 28, 2025 Matthew Gault
  • New Atroposia malware comes with a local vulnerability scanner October 28, 2025 Bill Toulas
  • AI browsers face a security flaw as inevitable as death and taxes October 28, 2025 Avram Piltch
  • Beatings, killings, and lasting fear: The human toll of MoD's Afghan data breach October 28, 2025 Connor Jones
  • Social Engineering People’s Credit Card Details October 28, 2025 Bruce Schneier
  • Google says reports of a Gmail breach have been greatly exaggerated October 28, 2025 Carly Page
  • A phishing with invisible characters in the subject line, (Tue, Oct 28th) October 28, 2025
  • Chatbots parrot Putin's propaganda about the illegal invasion of Ukraine October 28, 2025 Thomas Claburn
  • New Herodotus Android malware fakes human typing to avoid detection October 28, 2025 Bill Toulas
  • Cybersecurity Awareness Month: 4 reasons CISOs make exposure management a cornerstone of their cybersecurity strategy October 28, 2025

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP