Lucene search

K
certCERTVU:259890
HistoryFeb 08, 2005 - 12:00 a.m.

Windows Media Player does not properly handle PNG images with excessive width or height values

2005-02-0800:00:00
www.kb.cert.org
26

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.373 Low

EPSS

Percentile

97.2%

Overview

Microsoft Windows Media Player fails to properly handle PNG images containing unexpected information. Remote attackers may be able to craft a malicious PNG image that would cause Media Player to execute arbitrary code.

Description

Microsoft Windows Media Player (WMP) is an application that ships with Microsoft Windows systems. It is used to play various types of media files. WMP will recognize embedded URLs in media files and launch the site specified. According to MS05-009:

_A remote code execution vulnerability exists in Windows Media Player because it does not properly handle PNG files with excessive width or height values. An attacker could try to exploit the vulnerability by constructing a malicious PNG that could potentially allow remote code execution if a user visited a malicious Web site or clicked a link in a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system. _

Please refer to Microsoft Security Bulletin MS05-009 for more information regarding this vulnerability and its remediation. In addition, Note that this vulnerability is related to the issues described in VU#817368 or VU#388984.


Impact

If a remote attacker can persuade a user to access a malicious PNG file with Windows Media Player, that attacker may be able to execute arbitrary code.


Solution

Apply Patch

Microsoft has released Microsoft Security Bulletin MS05-009 to address this issue.


Do Not Follow Unsolicited Links

In order to convince users to visit their sites, attackers often use URL encoding, IP address variations, long URLs, intentional misspellings, and other techniques to create misleading links. Do not click on unsolicited links received in email, instant messages, web forums, or internet relay chat (IRC) channels. Type URLs directly into the browser to avoid these misleading links. While these are generally good security practices, following these behaviors will not prevent exploitation of this vulnerability in all cases.


Vendor Information

259890

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: February 08, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Microsoft Security Bulletin MS05-009.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23259890 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.microsoft.com/technet/security/Bulletin/MS05-009.mspx&gt;

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin MS05-009.

This document was written by Jeff Gennari based on information provided in Microsoft Security Bulletin MS05-009.

Other Information

CVE IDs: CVE-2004-1244
Severity Metric: 8.56 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.373 Low

EPSS

Percentile

97.2%