Microsoft Windows Media Player fails to properly handle PNG images containing unexpected information. Remote attackers may be able to craft a malicious PNG image that would cause Media Player to execute arbitrary code.
Microsoft Windows Media Player (WMP) is an application that ships with Microsoft Windows systems. It is used to play various types of media files. WMP will recognize embedded URLs in media files and launch the site specified. According to MS05-009:
A remote code execution vulnerability exists in Windows Media Player because it does not properly handle PNG files with excessive width or height values. An attacker could try to exploit the vulnerability by constructing a malicious PNG that could potentially allow remote code execution if a user visited a malicious Web site or clicked a link in a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
If a remote attacker can persuade a user to access a malicious PNG file with Windows Media Player, that attacker may be able to execute arbitrary code.
Do Not Follow Unsolicited Links
This vulnerability was reported in Microsoft Security Bulletin MS05-009.
This document was written by Jeff Gennari based on information provided in Microsoft Security Bulletin MS05-009.
|Date First Published:||2005-02-08|
|Date Last Updated:||2005-02-09 18:50 UTC|