"evaluatorImpact":"This bug cannot be leveraged for code execution according to the vendor. \r\n\r\nSource 1 - http://blogs.technet.com/swi/archive/2008/12/29/windows-media-player-crash-not-exploitable-for-code-execution.aspx\r\n\r\nSource 2 - http://blogs.technet.com/msrc/archive/2008/12/29/questions-about-vulnerability-claim-in-windows-media-player.aspx",
"descriptions":[
{
"lang":"en",
"value":"Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927."
},
{
"lang":"es",
"value":"Desbordamiento de entero en Microsoft Windows Media Player 9, 10 y 11, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de ficheros (1) WAV, (2) SND, o (3) MID manipulados. NOTA: no est\u00e1 claro si esta vulnerabilidad est\u00e1 relacionada con el CVE-2008-4927 o CVE-2008-2253."