Date: 08 November 2007
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
ESB-2007.0871 -- [Win]
Vulnerability in Macrovision SECDRV.SYS Driver on Windows
Could Allow Elevation of Privilege
8 November 2007
AusCERT Security Bulletin Summary
Product: Macrovision secdrv.sys driver
Operating System: Windows Server 2003
Impact: Increased Privileges
Access: Existing Account
CVE Names: CVE-2007-5587
Revision History: November 8 2007: Updated the description on the
secdrv.sys driver. Added a Workaround
involving disabling the driver in the
November 6 2007: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
Microsoft Security Advisory (944653)
Vulnerability in Macrovision SECDRV.SYS Driver on Windows Could Allow
Elevation of Privilege
- - Affected Software:
Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows Server 2003 x64 Edition Service Pack 2
- - Impact:
Elevation of Privilege
- - From the Microsoft Security Bulletin
What is secdrv.sys?
The driver, secdrv.sys, is used by games which use Macrovision SafeDisc.
The driver validates the authenticity of games that are protected with
SafeDisc and prohibits unauthorized copies of such games to play on
Windows. The secdrv.sys is included with Microsoft Windows XP, Windows
Server 2003 and Windows Vista to increase compatibility of the games
on Windows. Without the driver, games with SafeDisc protection would be
unable to play on Windows. SafeDisc remains inactive until invoked by a
game for authorization to play on Windows.
What causes this vulnerability?
The Macrovision secdrv.sys driver on supported editions of Windows Server
2003 and Windows XP incorrectly handles configuration parameters.
Install the update offered by Macrovision for systems running supported
editions of Windows XP and Windows Server 2003 to help protect against
this vulnerability. 
Disable the secdrv.sys driver in the system registry
Disabling the secdrv.sys driver in the system registry key helps protect
affected systems from attempts to exploit this vulnerability.
Note: Using Registry Editor incorrectly can cause serious problems that
may require you to reinstall your operating system. Microsoft cannot
guarantee that problems resulting from the incorrect use of Registry
Editor can be solved. Use Registry Editor at your own risk. For
information about how to edit the registry, view the "Changing Keys And
Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and
Delete Information in the Registry" and "Edit Registry Data" Help topics
Note: We recommend backing up the registry before you edit it.
1. Click Start, click Run, type regedit and then click Continue.
2. Expand HKEY_LOCAL_MACHINE, expand SYSTEM, expand CurrentControlSet,
and then expand Services.
3. Left click on Secdrv.
4. To backup the registry before your edit it, left click on File menu,
select Export... In the Export Registry File dialog type
Secdrv_configuration_backup.reg and select Save.
5. Right click on Start, select Modify, and change Value date: to 4.
Impact of Workaround: Programs that require the secdrv.sys driver will
 Macrovision - Updating the Macrovision SECDRV.SYS Driver
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to firstname.lastname@example.org
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----