Lucene search

K
seebugRootSSV:20187
HistoryOct 17, 2010 - 12:00 a.m.

Microsoft Windows Media Player重新加载操作内存破坏漏洞(MS10-082)

2010-10-1700:00:00
Root
www.seebug.org
22

EPSS

0.941

Percentile

99.2%

BUGTRAQ ID: 43772
CVE ID: CVE-2010-2745

Windows Media Player是微软操作系统中默认捆绑的媒体播放器。

Windows Media Player在重新加载操作过程中通过Web浏览器取消分配对象的方式中存在内存破坏漏洞。如果用户访问特制网页,此漏洞可能允许远程执行代码。如果用户使用管理用户权限登录,成功利用此漏洞的攻击者便可完全控制受影响的系统。

Microsoft Windows Media Player 9.0
Microsoft Windows Media Player 12
Microsoft Windows Media Player 11
Microsoft Windows Media Player 10.0
临时解决方法:

  • 注销wmp.dll

    对于32位Windows:
    Regsvr32.exe –u %WINDIR%\system32\wmp.dll

    对于64位Windows:
    Regsvr32.exe –u %WINDIR%\system32\wmp.dll
    Regsvr32.exe –u %WINDIR%\syswow64\wmp.dll

厂商补丁:

Microsoft

Microsoft已经为此发布了一个安全公告(MS10-082)以及相应补丁:
MS10-082:Vulnerability in Windows Media Player Could Allow Remote Code Execution (2378111)
链接:http://www.microsoft.com/technet/security/bulletin/MS10-082.mspx?pf=true


                                                <html>  
  <body onload="setTimeout('location.reload()', 1000);">
    <embed type="application/x-mplayer2" src="file.wmv"></embed>
  </body>
</html>