vendor:
Windows Media Player
by:
Matthew Murphy
9,3
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Windows Media Player
Affected Version From: Windows Media Player 10
Affected Version To: Windows XP SP2 (US)
Patch Exists: YES
Related CWE: CVE-2006-0003
CPE: a:microsoft:windows_media_player
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Firefox 1.5.0.1, Windows Media Player 10, Windows XP SP2 (US)
2006
WMP Plugin EMBED Exploit
The Windows Media Player plug-in for non-Microsoft browsers (Firefox, Opera, etc.) suffers from an exploitable overflow in its handling of EMBED tags. Specifically, a very long SRC property on such a tag can lead to an overflow that will corrupt a structured exception handling frame. The SEH frame is the vector of control that is exploited. DEP is turned off for non-Microsoft code, so there's no issue there. The overrun buffer (the SRC attribute) is seriously mangled before it is handled by the plug-in. In particular, any character with the sign bit set (> 0x7F) is replaced.
Mitigation:
Ensure that the Windows Media Player plug-in is up to date and that all security patches are applied.