Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS09-028: Vulnerabilities in Microsoft DirectShow could allow remote code execution


View products that this article applies to.

Introduction

Microsoft has released security bulletin MS09-028. To view the complete security bulletin, visit one of the following Microsoft Web sites:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

↑ Back to the top


More information

Known issues with this security update

  • The computer is not protected if you apply an incorrect version of this security update
    If you manually download and then apply an incorrect version of this security update, the computer will not be protected. For example, consider the following scenario:
    1. You previously upgraded the in-box DirectX component on a computer that is running Windows 2000 or Windows XP to a newer version of DirectX. For example, you upgraded the default version of DirectX version 7 in Windows 2000 to DirectX version 8 or 9.
    2. You manually download the update for DirectX version 7 from the Microsoft download center, and then you installed it on the affected computer.
    In this scenario, the update installs successfully. However, the vulnerable binary is not replaced. Therefore, the computer remains in a vulnerable condition.

    We recommend that you run the DirectX Diagnostic Tool to determine the version of DirectX that you are running to verify that you download the correct version of this security update. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    157730 How to Determine the Version of DirectX Using the DirectX Diagnostic Tool
  • The Quartz.dll file appears as an unsigned binary
    Consider the following scenario:
    • You install this update on a computer that is running Microsoft Windows 2000 with Service Pack 4 and that has DirectX 7 or DirectX 8 installed.
    • You upgrade the system to DirectX 8 or DirectX 9.
    • You try to update the system again with this update.
    In this scenario, the Quartz.dll file is successfully updated to the secured version. However, the file may appear as an unsigned binary.

    To avoid this issue, follow these steps:
    1. Uninstall the update for the earlier version of DirectShow.
    2. Manually delete the following catalog file:
      %systemroot%\system32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\KB971633.cat
    3. Upgrade to the newer version of DirectShow.
    4. Install the security update that is appropriate for the new version of DirectX.

↑ Back to the top


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows 2000 file information

DirectX 7.0 with Microsoft Windows 2000 Service Pack 4

File nameFile versionFile sizeDateTimePlatform
Quartz.dll6.1.9.736795,40803-Jun-200919:45x86

DirectX 8.1 with Microsoft Windows 2000 Service Pack 4


File nameFile versionFile sizeDateTimePlatform
Quartz.dll6.3.1.8931,668,60805-Jun-200901:20x86

DirectX 9.0 with Microsoft Windows 2000 Service Pack 4


File nameFile versionFile sizeDateTimePlatform
Quartz.dll6.5.1.9111,225,72803-Jun-200902:23x86

Windows XP and Windows Server 2003 file information

  • The files that apply to a specific milestone (RTM, SPn) and service branch (QFE, GDR) are noted in the "SP requirement" and "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

DirectX 9.0 with x86-based versions of Windows XP

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Quartz.dll6.5.2600.35801,290,75203-Jun-200919:27x86SP2SP2GDR
Quartz.dll6.5.2600.35801,291,26403-Jun-200919:24x86SP2SP2QFE
Quartz.dll6.5.2600.58221,291,26403-Jun-200919:09x86SP3SP3GDR
Quartz.dll6.5.2600.58221,291,26403-Jun-200919:12x86SP3SP3QFE


DirectX 9.0 with x64-based versions of Windows Server 2003 and of Windows XP Professional x64 edition

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Quartz.dll6.5.3790.45232,181,12004-Jun-200909:13x64SP2SP2GDR
Wquartz.dll6.5.3790.45231,277,95204-Jun-200909:13x86SP2SP2GDR\WOW
Quartz.dll6.5.3790.45232,181,63204-Jun-200909:11x64SP2SP2QFE
Wquartz.dll6.5.3790.45231,278,46404-Jun-200909:11x86SP2SP2QFE\WOW

DirectX 9.0 with x86-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Quartz.dll6.5.3790.45231,277,95204-Jun-200910:14x86SP2SP2GDR
Quartz.dll6.5.3790.45231,278,46404-Jun-200910:14x86SP2SP2QFE

DirectX 9.0 with IA-64-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Quartz.dll6.5.3790.45233,995,13604-Jun-200909:13IA-64SP2SP2GDR
Wquartz.dll6.5.3790.45231,277,95204-Jun-200909:13x86SP2SP2GDR\WOW
Quartz.dll6.5.3790.45233,995,64804-Jun-200909:10IA-64SP2SP2QFE
Wquartz.dll6.5.3790.45231,278,46404-Jun-200909:10x86SP2SP2QFE\WOW

↑ Back to the top


Keywords: atdownload, kbbug, kbexpertiseinter, kbfix, kbsecbulletin, kbsecurity, kbsecvulnerability, kbsurveynew, KB971633

↑ Back to the top

Article Info
Article ID : 971633
Revision : 3
Created on : 5/8/2012
Published on : 5/8/2012
Exists online : False
Views : 414