Vulnerability Note VU#222044
Microsoft Windows Media Player fails to properly launch URLs based on Dynamic HTML (DHTML) behaviors
Microsoft Windows Media Player (WMP) permits the embedding of URLs into media files. When launching an embedded URL, a logic error in the WMP URL handling makes it possible to move from a less trusted domain zone into the local computer zone. This vulnerability permits an attacker to execute arbitrary code in the context of the current user.
Microsoft Windows Media Player (WMP) is an application that ships with Microsoft Windows systems. It is used to play various types of media files. WMP will recognize embedded URLs in media files and launch the site specified. When launching an embedded URL, a logic error in the WMP URL handling with respect to DHTML makes it possible to launch the site in the local computer zone, rather than a less trusted zone such as Internet or Restricted. This vulnerability permits an attacker to execute arbitrary code in the context of the current user.
The attacker must get the victim to run the malicious media file in order to exploit this vulnerability. The media file may be embedded in a web site, email message, or downloaded and played by the user.
A remote attacker may be able to execute arbitrary code on the local system.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||06 Oct 2003|
CVSS Metrics (Learn More)
This vulnerability was reported in a Microsoft Security Bulletin.
This document was written by Jason A Rafail.
- CVE IDs: Unknown
- Date Public: 03 Jun 2003
- Date First Published: 06 Oct 2003
- Date Last Updated: 06 Oct 2003
- Severity Metric: 37.46
- Document Revision: 5
If you have feedback, comments, or additional information about this vulnerability, please send us email.