Fortinet Discovers Vulnerability in Indeo Codec

2009.December.08



Summary:



Fortinet's FortiGuard Labs Discovers Memory Corruption Vulnerability in Indeo 
Codec.



Impact:



Remote Code Execution. 



Risk:



Critical. 



Affected Software:



For a list of operating system and product versions affected, please see the 
Microsoft Security Advisory reference below. 



Additional Information:



The Indeo codec on systems running Microsoft Windows 2000, Windows XP, and 
Windows Server 2003 could allow code to run on users systems when opening 
specially crafted content. There are multiple ways that the Indeo codec may be 
used and may be required by certain applications. The Indeo codec may be 
required when visiting legitimate Web sites, and in corporate environment 
line-of-business applications. 



Solutions:

•       Use the solution provided by Microsoft (Microsoft Security Advisory 
954157).

•       FortiGuard Labs released a signature 
"MS.Windows.Indeo.Codec.Memory.Corruption", which covers this specific 
vulnerability.

FortiGuard Labs continues to monitor attacks against this vulnerability. 



Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) 
service should be protected against this memory corruption vulnerability. 
Fortinet’s IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by FortiGuard Labs, which enables Fortinet to deliver a 
combination of multi-layered security intelligence and true zero-day protection 
from new and emerging threats. These updates are delivered to all FortiGate, 
FortiMail and FortiClient products. Fortinet strictly follows responsible 
disclosure guidelines to ensure optimum protection during a threat's lifecycle. 



References: 

•       Microsoft Security Advisory: 
http://www.microsoft.com/technet/security/advisory/954157.MSpx";

•       Microsoft Knowledge Base Article: http://support.microsoft.com/kb/954157

•       CVE ID: CVE-2009-4210



Acknowlegement: 

•       Bing Liu of Fortinet's FortiGuard Labs

Reply via email to