A remote code execution vulnerability exists when Windows Media Foundation improperly parses specially crafted QuickTime media files.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
To exploit the vulnerability, an attacker must send a specially crafted QuickTime file to a user and convince them to open it. When opened, the malicious QuickTime file will execute code of the attacker’s choice on the target system.
The security update addresses the vulnerability by ensuring Windows Media Foundation properly parses QuickTime media files.