Zero-day vulnerability in Windows

Stack-based buffer overflow
CVE-2010-0480

According to Symantec the first exploitation of the vulnerability was discovered on 26.03.2010.

Known malware:

Bloodhound.Exploit.324

Vulnerability details

Advisory: SB2010041302 - Buffer overflow in MPEG layer-3 codecs in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2010-0480

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Description:

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to multiple boundary errors within Microsoft MPEG Layer-3 codecs when parsing AVI files. A remote unauthenticated attacker can create a specially crafted AVI file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: the vulnerability was being actively exploited.

Public Exploits:

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.