Stack-Based Buffer Overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4
CVE-2008-1444

Currently unrated

Key Information:

Vendor
Microsoft
Status
Vendor
CVE Published:
12 June 2008

Summary

A stack-based buffer overflow was identified in Microsoft DirectX versions 7.0 and 8.1, particularly impacting systems running Windows 2000 SP4. This vulnerability arises when the software processes Synchronized Accessible Media Interchange (SAMI) files with specially crafted parameters for the Class Name variable. Successful exploitation allows remote attackers to execute arbitrary code on an affected system, posing significant security risks to users.

References

EPSS Score

63% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.