Overview
Microsoft Windows Media Player (WMP) permits the embedding of URLs into media files. When launching an embedded URL, a logic error in the WMP URL handling makes it possible to move from a less trusted domain zone into the local computer zone. This vulnerability permits an attacker to execute arbitrary code in the context of the current user.
Description
Microsoft Windows Media Player (WMP) is an application that ships with Microsoft Windows systems. It is used to play various types of media files. WMP will recognize embedded URLs in media files and launch the site specified. When launching an embedded URL, a logic error in the WMP URL handling with respect to DHTML makes it possible to launch the site in the local computer zone, rather than a less trusted zone such as Internet or Restricted. This vulnerability permits an attacker to execute arbitrary code in the context of the current user. The attacker must get the victim to run the malicious media file in order to exploit this vulnerability. The media file may be embedded in a web site, email message, or downloaded and played by the user.
|
Impact
A remote attacker may be able to execute arbitrary code on the local system. |
Solution
Microsoft has released Knowledgebase article 828026 to address this issue. This issue is also mentioned in MS03-040 which addresses a similar vulnerability in Internet Explorer (VU#668380). |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported in a Microsoft Security Bulletin.
This document was written by Jason A Rafail.
Other Information
CVE IDs: | None |
Severity Metric: | 37.46 |
Date Public: | 2003-06-03 |
Date First Published: | 2003-10-06 |
Date Last Updated: | 2003-10-06 20:42 UTC |
Document Revision: | 5 |