Windows Media Player Again Lets Remote Users Install and Execute Code
SecurityTracker Alert ID: 1007287|
SecurityTracker URL: http://securitytracker.com/id/1007287
(Links to External Site)
Updated: Jul 30 2003|
Original Entry Date: Jul 24 2003
Execution of arbitrary code via network, User access via network|
Version(s): 8 and prior|
A vulnerability was reported in Windows Media Player. A remote user can install and execute arbitrary code on a target user's computer.|
http-equiv (malware.com) reported that a remote user can create HTML that, when loaded by the target user, will launch Windows Media Player (WMP) and cause WMP to install and execute arbitrary software on the target user's system. The code will run with the privileges of the target user.
According to the report, this can be achieved via a malicious WMP file (*.asf) that performs a zero-second URL flip to execute local code.
A demonstration exploit example that appears to open Windows Explorer is available at:
The demonstration exploit reportedly works on all versions prior to WMP 9.
A remote user can create a Windows Media File that will execute files on the target user's system.|
No solution was available at the time of this entry.|
Vendor URL: www.microsoft.com/technet/security/ (Links to External Site)
Access control error|
|Underlying OS: Windows (Any)|
Source Message Contents
Subject: Drivial Pursuit: Internet Explorer Browser & Your Files and Folders !|
Wednesday, 23 July, 2003
Yet another quaint lead-up to "silent delivery and installation of an
executable on a target computer. No client input other than viewing a
web page" !
This is getting boring.
A myriad of technical hurdles have been recently placed to disallow
access to files and folders on the local machine from the internet.
Previously simple redirects could defeat that, but that too has been
Coupled with a myriad of existing possibilities of placing arbitrary
files in known locations on the local machine, along with perhaps
several other well known applications that create sensitive files in
known locations on the local machine, accessing all of these with our
trusty browser commonly known as IE, leaves us with ample opportunity
to wreak further havoc on the unsuspecting customers of the
manufacturer, one "Microsoft".
For an ever increasing list of component possibilities seek here:
Once again the problem lies within our trusty and battle-hardened
Windows Media Player. Two second creation of Zero second URL flip to
local machine, allows us the desired access. Whether this is the
result of a 'trusted' media file or not is unclear. Not important.
Custom crafted media files seem to fail.
Fails on WMP 9 but fully functional on all others regardless of
ATTENTION: demo is merely first step. Plug 'n Play any of the
available components in the listing above for maximum results:
1. We appear to be going around and around in circles now
2. We see no possibility of ever expending one red cent to this
particular toy manufacturer. As such we are stuck with what we have.
We would be interested to thoroughly examining the latest and
greatest toys created by these people and should someone feel like
lending us a couple shiny new machines with default installs of the
latest and greatest toys, we'll be happy come to some sort of mutualy