header-logo
Suggest Exploit
vendor:
Windows Media Player
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Windows Media Player
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

Microsoft Windows Media Player Buffer Overflow Vulnerability

The Microsoft Windows Media Player executable is prone to a buffer overflow condition when invoked with an oversized filename. Since the program is executed in the context of the user invoking it, it is not likely that a local attacker could exploit this issue to gain elevated privileges. However, if the program can be invoked remotely or a user can be somehow enticed into invoking the program with a malformed filename, then this may be exploited by an attacker. Realistically, another exposure or vulnerability would have to exist on the host system for an attacker to exploit this issue.

Mitigation:

Ensure that the Windows Media Player executable is not invoked with an oversized filename.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/5357/info

The Microsoft Windows Media Player executable is prone to a buffer overflow condition when invoked with an oversized filename.

Since the program is executed in the context of the user invoking it, it is not likely that a local attacker could exploit this issue to gain elevated privileges. However, if the program can be invoked remotely or a user can be somehow enticed into invoking the program with a malformed filename, then this may be exploited by an attacker. Realistically, another exposure or vulnerability would have to exist on the host system for an attacker to exploit this issue.

It is not currently known exactly which versions of the software are affected. 

From the command prompt it is possible to reproduce this issue with this command:

mplay32.exe A<x279>.mp3

On an unpatched IIS server it is possibly to invoke the application with the following request:

http://target/scripts/..%255c..%255cwinnt/system32.exe?/A<x279>.mp3