Microsoft Windows Media Player .WMS Arbitrary Script Vulnerability
BID:1976
Info
Microsoft Windows Media Player .WMS Arbitrary Script Vulnerability
| Bugtraq ID: | 1976 |
| Class: | Access Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 22 2000 12:00AM |
| Updated: | Nov 22 2000 12:00AM |
| Credit: | Discovered by GFI and posted in a Microsoft Security Bulletin (MS00-090) on Nov 22, 2000. |
| Vulnerable: |
Microsoft Windows Media Player 7.0 |
| Not Vulnerable: | |
Discussion
Microsoft Windows Media Player .WMS Arbitrary Script Vulnerability
Windows Media Player is an application used for digital audio, and video content viewing.
It is possible for a user running Windows Media Player 7 to enable a skin (.wms) file and unknowingly execute an embedded malicious script. When a user attempts to retrieve a skin (.wms) file it is downloaded and resides on the user's local machine. If Windows Media Player is run with the malicious skin enabled, the Active X component would allow any arbitrary action to be achieved. Depending on internet security settings this vulnerability is also exploitable if the skin file in question resides on a web site. The script could automatically launch when a user visits the web site.
Execution of arbitrary scripts could make it possible for the malicious host to gain rights equivalent to those of the current user.
Windows Media Player is an application used for digital audio, and video content viewing.
It is possible for a user running Windows Media Player 7 to enable a skin (.wms) file and unknowingly execute an embedded malicious script. When a user attempts to retrieve a skin (.wms) file it is downloaded and resides on the user's local machine. If Windows Media Player is run with the malicious skin enabled, the Active X component would allow any arbitrary action to be achieved. Depending on internet security settings this vulnerability is also exploitable if the skin file in question resides on a web site. The script could automatically launch when a user visits the web site.
Execution of arbitrary scripts could make it possible for the malicious host to gain rights equivalent to those of the current user.
Exploit / POC
Microsoft Windows Media Player .WMS Arbitrary Script Vulnerability
Sandro Gauci <[email protected]> has provided the following exploit:
Sandro Gauci <[email protected]> has provided the following exploit:
Solution / Fix
Microsoft Windows Media Player .WMS Arbitrary Script Vulnerability
Solution:
Microsoft has released a cumulative patch which eliminates the vulnerability:
Microsoft Windows Media Player 7.0
Solution:
Microsoft has released a cumulative patch which eliminates the vulnerability:
Microsoft Windows Media Player 7.0
References
Microsoft Windows Media Player .WMS Arbitrary Script Vulnerability
References:
References: