<?xml version="1.0"?>
<?xml-stylesheet href="../fma_report_en.xslt" type="text/xsl" ?>

<advisory xml:space="preserve">
	<meta>
		<description>Windows Explorer 6.0.2900.5512 AVI (Audio Video Interleave) Denial of Service Vulnerability</description>
		<keywords>advisory, fuzzing, security, blackbox, tests, Windows Explorer, Shmedia.dll, DoS, AVI</keywords>
	</meta>

	<title>Windows Explorer 6.0.2900.5512 (Shmedia.dll 6.0.2900.5512) AVI (Audio Video Interleave) Denial of Service Vulnerability during preview of movie thumbnail</title>
	<id>FMA-2011-007</id>

	<application>
		<name>Windows Explorer</name>
		<version>6.0.2900.5512</version>
		<url>http://www.microsoft.com</url>
		<files>
			<file>
				<name>Shmedia.dll</name>
				<version>6.0.2900.5512</version>
				<md5>1b8182c8fe6172727c3cf47415cbad8f</md5>
			</file>
			<file>
				<name>Explorer.exe</name>
				<version>6.0.2900.5512</version>
				<md5>c791ed9eac5e76d9525e157b1d7a599a</md5>
			</file>
		</files>
		<verified>
			<os>
				<name>Windows XP SP3 Home Edition</name>
			</os>
			<os>
				<name>Windows XP SP3 Professional Edition</name>
			</os>
		</verified>
	</application>
	
	<discovery>
		<found>2011.03.27</found>
		<published> 2011.03.29</published>
		<vendor_notified>n/a</vendor_notified>
	</discovery>
	
	<vulnerabilities>
		<vulnerability>
			<name>Windows Explorer 6.0.2900.5512 Denial of Service vulnerability.</name>
			<type>DoS</type>
			<description>Vulnerability can be triggered locally or from remote network share. There are a few possibilities to execute the exploit. User can trigger the exploit automatically, by enabling content preview in directory settings and browse directory with exploit. The second possibility is when user selects the file, so the preview will be generated by Explorer and exploit will be executed. Vendor was not notified because after the discovery of the vulnerability by FuzzMyApp it turned out that the vulnerability was publically disclosed already.</description>
			<exception>Denial of Service is caused by unhandled exception raised in module Shmedia.dll loaded into Explorer.exe process. Exception is triggered by integer division by zero in Shmedia.dll module.</exception>
			<images>
				<image>
					<thumbnail>
						<src>image01s.png</src>
						<width>100</width>
						<height>80</height>
					</thumbnail>
					<src>image01.png</src>
					<alt>Integer division by zero exception raised in Shmedia.dll module.</alt>
					<text>Integer division by zero exception raised in Shmedia.dll module.</text>
				</image>
			</images>
		</vulnerability>	
	</vulnerabilities>
</advisory>