Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
BID:1714
Info
Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
| Bugtraq ID: | 1714 |
| Class: | Failure to Handle Exceptional Conditions |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Sep 26 2000 12:00AM |
| Updated: | Sep 26 2000 12:00AM |
| Credit: | Discovered by USSR Labs <[email protected]> and publicized in a Microsoft Security Bulletin (MS00-068) on September 26, 2000. |
| Vulnerable: |
Microsoft Windows Media Player 7.0 |
| Not Vulnerable: | |
Discussion
Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
Due to a flaw in the method Microsoft Windows Media Player 7 handles OCX controls (ActiveX containers) in embedded in RTF email messages, it is possible to crash RTF-enabled email clients such as Microsoft Outlook and Outlook Express. While this vulnerability lies in the OCX control implementation in Windows Media Player 7, it only affects RTF-enabled email clients.
If a user of Outlook or Outlook Express were to receive an RTF email containing an embedded OCX control associated with Windows Media Player 7, the client would fail when the message was closed. Restarting the application would be required in order to regain normal functionality. In addition, deleting the offending email would resume normal operations of the email client. The functionality of Windows Media Player 7 would not be affected in any way.
Due to a flaw in the method Microsoft Windows Media Player 7 handles OCX controls (ActiveX containers) in embedded in RTF email messages, it is possible to crash RTF-enabled email clients such as Microsoft Outlook and Outlook Express. While this vulnerability lies in the OCX control implementation in Windows Media Player 7, it only affects RTF-enabled email clients.
If a user of Outlook or Outlook Express were to receive an RTF email containing an embedded OCX control associated with Windows Media Player 7, the client would fail when the message was closed. Restarting the application would be required in order to regain normal functionality. In addition, deleting the offending email would resume normal operations of the email client. The functionality of Windows Media Player 7 would not be affected in any way.
Exploit / POC
Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
USSR Labs <[email protected]> has released the following exploit:
Malformed WMP Embedded RTF/Email Spawner
Binary - wmpoutlook.exe
Source - wmpoutlook.zip
USSR Labs <[email protected]> has released the following exploit:
Malformed WMP Embedded RTF/Email Spawner
Binary - wmpoutlook.exe
Source - wmpoutlook.zip
Solution / Fix
Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
Solution:
Microsoft has released a patch which eliminates this vulnerability:
Microsoft Windows Media Player 7.0
Solution:
Microsoft has released a patch which eliminates this vulnerability:
Microsoft Windows Media Player 7.0