Microsoft Windows Media Player (WMP) permits the embedding of URLs into media files. When launching an embedded URL, a logic error in the WMP URL handling makes it possible to move from a less trusted domain zone into the local computer zone. This vulnerability permits an attacker to execute arbitrary code in the context of the current user.
Microsoft Windows Media Player (WMP) is an application that ships with Microsoft Windows systems. It is used to play various types of media files. WMP will recognize embedded URLs in media files and launch the site specified. When launching an embedded URL, a logic error in the WMP URL handling with respect to DHTML makes it possible to launch the site in the local computer zone, rather than a less trusted zone such as Internet or Restricted. This vulnerability permits an attacker to execute arbitrary code in the context of the current user.
The attacker must get the victim to run the malicious media file in order to exploit this vulnerability. The media file may be embedded in a web site, email message, or downloaded and played by the user.
A remote attacker may be able to execute arbitrary code on the local system.
This vulnerability was reported in a Microsoft Security Bulletin.
This document was written by Jason A Rafail.
|Date First Published:||2003-10-06|
|Date Last Updated:||2003-10-06 20:42 UTC|