Unchecked Buffer in DirectX Could Enable System Compromise (819696)

Published by

A security issue has been identified in Microsoft® DirectX® that could allow an attacker to run programs on a computer running Microsoft Windows®. The attacker would first have to send you an e-mail message or entice you into visiting a malicious Web site. You can help protect your computer by installing this update from Microsoft. Affected Versions: DirectX® 5.2 on Windows 98 DirectX 6.1 on Windows 98 SE DirectX 7.1 on Windows Millennium Edition DirectX 7.0 on Windows 2000 DirectX 8.0, 8.0a, 8.1, 8.1a, and 8.1b DirectX 9.0a Windows NT 4 Read more More Information About This Update:

Microsoft DirectX is a group of technologies designed to make Windows-based computers run certain graphics, video, 3D animation, and audio applications. You should apply this update if you run any of the affected software above. Also, if you have a version of DirectX installed on your computer that is not listed above you should consider upgrading to DirectX 9.0b. This bulletin was originally issued on July 23, 2003. It has been reissued to reflect that an additional update is available for users running Microsoft DirectX 8.0, 8.0a, 8.1, 8.1a, 8.1b when installed on Windows 98, Windows 98 SE, Windows Millennium Edition, or Windows 2000. Users who previously installed any of the originally offered updates are not affected by this development and need take no action. Download Patch in several languages over here