Vulnerability Note VU#291396

Microsoft Windows Media Player vulnerable to buffer overflow in bitmap processing routine

Original Release date: 14 Feb 2006 | Last revised: 17 Mar 2006


Microsoft Windows Media Player contains a buffer overflow vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.


Microsoft Windows Media Player (WMP) is an application that ships with Microsoft Windows systems used to play various types of media files. Windows Media Player fails to properly validate bitmap image files (.bmp), potentially allowing a buffer overflow to occur.

If the size field in the bitmap header is set to set to a value that is less than the actual size of the file, WMP will allocate an under-sized buffer to hold the bitmap. When data is copied to this buffer, the buffer overflow may occur. For more information, please see Microsoft Security Bulletin MS06-005.

Exploit code for this vulnerability is publicly available.


By persuading a user to open a specially crafted bitmap file with Windows Media Player, an attacker may be able to execute arbitrary code with the privileges of the user.


Apply an Update
Microsoft has addressed this issue in Microsoft Security Bulletin MS06-005.

Please see Microsoft Security Bulletin MS06-005 for a list of workarounds to mitigate this vulnerability.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-14 Feb 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported in Microsoft Security Bulletin MS06-005. Microsoft credits Marc Maiffret of eEye Digital Security with providing information regarding this issue.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-0006
  • Date Public: 14 Feb 2006
  • Date First Published: 14 Feb 2006
  • Date Last Updated: 17 Mar 2006
  • Severity Metric: 27.00
  • Document Revision: 25


If you have feedback, comments, or additional information about this vulnerability, please send us email.