Microsoft Windows Media Player缓冲区溢出漏洞

Microsoft Windows Media Player缓冲区溢出漏洞

漏洞ID 1106095 漏洞类型 缓冲区溢出
发布时间 2000-11-22 更新时间 2005-10-12
图片[1]-Microsoft Windows Media Player缓冲区溢出漏洞-安全小百科CVE编号 CVE-2000-1113
图片[2]-Microsoft Windows Media Player缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200101-077
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20427
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200101-077
|漏洞详情
MicrosoftWindowsMediaPlayer存在缓冲区溢出漏洞。远程攻击者借助畸形的ActiveStreamRedirector(.ASX)文件执行任意命令。又称为”.ASXBufferOverrun”漏洞。
|漏洞EXP
source: http://www.securityfocus.com/bid/1980/info

Windows Media Player is an application used for digital audio, and video content viewing. An unsafe buffer copy involving remotely-obtained data exists in the Active Stream Redirector (ASX) component in Windows Media Player. The ASX enables a user to play streaming media residing on an intranet or external site. .ASX files are metafiles that redirect streaming media content from a browser to Windows Media Player.

The contents of ASX files, when being interpreted by Windows Media Player, are copied into memory buffers for run-time use. When this data is copied, it is not ensured that the amount of data copied is within the predefined size limits. As a result, any extraneous data will be copied over memory boundaries and can overwrite neighbouring memory on the program's stack.

Depending on the data that is copied, a denial of service attack could be launched or arbitrary code could be executed on the target host. Windows Media Player runs in the security context of the user currently logged on, therefore arbitrary code would be run at the privilege level of that particular user. If random data were entered into the buffer, the application would crash and restarting the application is required in order to regain normal functionality.

If a user was misled to download a hostile .ASX file to the local machine, they would only have to single click on the file within Windows Explorer to activate the code. This is due to the 'Web View' option that is used by Windows Explorer to preview web documents automatically while browsing (this feature is enabled by default). In addition, a malformed .ASX file could be embedded into a HTML document and be configured to execute when opened via a browser or HTML compliant email client.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20427.zip
|参考资料

来源:BID
名称:1980
链接:http://www.securityfocus.com/bid/1980
来源:MS
名称:MS00-090
链接:http://www.microsoft.com/technet/security/bulletin/MS00-090.asp
来源:XF
名称:mediaplayer-asx-bo
链接:http://xforce.iss.net/static/5574.php
来源:ATSTAKE
名称:A112300-1
链接:http://www.atstake.com/research/advisories/2000/a112300-1.txt

相关推荐: H-Sphere Webshell Command2.CC Zipfile URI Parameter Command Execution Vulnerability

H-Sphere Webshell Command2.CC Zipfile URI Parameter Command Execution Vulnerability 漏洞ID 1100998 漏洞类型 Input Validation Error 发布时间 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享