CVE-2008-1444

N/A Unknown
Published: June 12, 2008 Modified: April 23, 2026
View on NVD

Description

Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the "SAMI Format Parsing Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=121380194923597&w=2
Source: secure@microsoft.com
Mailing List
http://secunia.com/advisories/30579
Source: secure@microsoft.com
Patch Vendor Advisory
http://securityreason.com/securityalert/3937
Source: secure@microsoft.com
Third Party Advisory
http://securitytracker.com/id?1020223
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29578
Source: secure@microsoft.com
Patch Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-162B.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1780
Source: secure@microsoft.com
Broken Link
http://www.zerodayinitiative.com/advisories/ZDI-08-040/
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=121380194923597&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://secunia.com/advisories/30579
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://securityreason.com/securityalert/3937
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1020223
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/493250/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/29578
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-162B.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1780
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.zerodayinitiative.com/advisories/ZDI-08-040/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
60.9%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft