CVE-2009-1537

KEV
Published: Mag 29, 2009 Last Modified: Apr 23, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 9,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted QuickTime media file, as exploited in the wild in May 2009, aka 'DirectX NULL Byte Overwrite Vulnerability.'

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,6808
Percentile
1,0th
Updated

EPSS Score Trend (Last 75 Days)

Operating System

Windows Xp by Microsoft

cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:8.1b:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 2003 Server by Microsoft

cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:7.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:9.0c:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:7.0a:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Server 2003 by Microsoft

cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:7.1:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 2003 Server by Microsoft

cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:9.0b:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 2000 by Microsoft

cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:8.1:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Xp by Microsoft

cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Directx by Microsoft

cpe:2.3:a:microsoft:directx:9.0a:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Xp by Microsoft

cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 2003 Server by Microsoft

cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-97…
http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-…
http://isc.sans.org/diary.html?storyid=6481
http://osvdb.org/54797
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-0…
http://secunia.com/advisories/35268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
http://www.microsoft.com/technet/security/advisory/971778.mspx
http://www.securityfocus.com/bid/35139
http://www.securitytracker.com/id?1022299
http://www.us-cert.gov/cas/techalerts/TA09-195A.html
http://www.vupen.com/english/advisories/2009/1445
http://www.vupen.com/english/advisories/2009/1886
http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-97…
http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-…
http://isc.sans.org/diary.html?storyid=6481
http://osvdb.org/54797
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-0…
http://secunia.com/advisories/35268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
http://www.microsoft.com/technet/security/advisory/971778.mspx
http://www.securityfocus.com/bid/35139
http://www.securitytracker.com/id?1022299
http://www.us-cert.gov/cas/techalerts/TA09-195A.html
http://www.vupen.com/english/advisories/2009/1445
http://www.vupen.com/english/advisories/2009/1886