Overview
A vulnerability in the Windows Media Player may allow remote attackers to view the contents of local files on the victim's computer.
Description
Using the "LaunchURL" method of the Windows Media Player ActiveX control, a web page author may be able to circumvent the frame security features normally present in Internet Explorer. It appears that javascript executed via the "LaunchURL" method executes in the frame associated with the Media Player control. Portions of the document object model that would not normally be accessible to the javascript are accessible when executed in this context. This vulnerability has not been confirmed to exist or operate as described, but seems credible. |
Impact
A victim who visits a web page may expose local files to an attacker who created the malicious web page. This vulnerability is also reported to allow attackers to execute arbitrary code on the victim's system, but this has not been confirmed. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Georgi Guninski discovered this vulnerability.
This document was written by Cory F. Cohen.
Other Information
CVE IDs: | None |
Severity Metric: | 7.65 |
Date Public: | 2001-01-01 |
Date First Published: | 2002-09-27 |
Date Last Updated: | 2003-03-26 20:43 UTC |
Document Revision: | 11 |