Stack-Based Buffer Overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4
CVE-2008-1444
Currently unrated
Summary
A stack-based buffer overflow was identified in Microsoft DirectX versions 7.0 and 8.1, particularly impacting systems running Windows 2000 SP4. This vulnerability arises when the software processes Synchronized Accessible Media Interchange (SAMI) files with specially crafted parameters for the Class Name variable. Successful exploitation allows remote attackers to execute arbitrary code on an affected system, posing significant security risks to users.
References
EPSS Score
63% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved