Vulnerability Note VU#879920

Microsoft Windows Media Player ActiveX control allows execution of javascript in "already open" frames

Original Release date: 27 Sep 2002 | Last revised: 26 Mar 2003


A vulnerability in the Windows Media Player may allow remote attackers to view the contents of local files on the victim's computer.


Using the "LaunchURL" method of the Windows Media Player ActiveX control, a web page author may be able to circumvent the frame security features normally present in Internet Explorer. It appears that javascript executed via the "LaunchURL" method executes in the frame associated with the Media Player control. Portions of the document object model that would not normally be accessible to the javascript are accessible when executed in this context.

This vulnerability has not been confirmed to exist or operate as described, but seems credible.


A victim who visits a web page may expose local files to an attacker who created the malicious web page. This vulnerability is also reported to allow attackers to execute arbitrary code on the victim's system, but this has not been confirmed.


The CERT/CC is currently unaware of a practical solution to this problem.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationUnknown-16 Jul 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Georgi Guninski discovered this vulnerability.

This document was written by Cory F. Cohen.

Other Information

  • CVE IDs: Unknown
  • Date Public: 01 Jan 2001
  • Date First Published: 27 Sep 2002
  • Date Last Updated: 26 Mar 2003
  • Severity Metric: 7.65
  • Document Revision: 11


If you have feedback, comments, or additional information about this vulnerability, please send us email.