05 January 2007 | 7,237 views

Serious Exploit in Windows Media Player (WMP)

Check For Vulnerabilities with Acunetix

Oh look! Another 0-day in Windows…this time in Media Player, there was a few in Word lately and the latest thing that just hit is an XSS flaw in PDF files online.

I’ll report more on those later.

The Windows Media Player library WMVCORE.DLL contains a potentially exploitable heap buffer overflow in its handling of “REF HREF” URLs within ASX files. If the URL contains an unrecognized protocol (only “file”, “ftp”, “http”, “https”, “mms”, “mmst”, “mmsu”, “rtsp”, “rtspt”, and “rtspu” appear to be recognized), the function at 7D7A8F27 in WMVCORE.DLL version 9.0.0.3250, and at 086E586E in WMVCORE.DLL version 10.0.0.3802, will create a copy of the string in which the protocol is replaced with “mms”. A heap buffer is allocated, the string “mms” is copied into it, and then everything after and including “://” in the “REF HREF” URL is concatenated using wcsncat.

So what out what you are streaming..please! Or alternatively use something decent like Winamp.

Unfortunately, the heap buffer for the new “mms” URL is allocated to the size of the “REF HREF” URL, and even more unfortunately, the length of the input string being passed to wcsncat is supplied as the character count, effectively causing wcsncat to behave identically to wcscat. As a result, a two- or four-byte heap overflow is possible if the “REF HREF” URL features a protocol shorter than three characters (the length of “mms”).

Single-letter protocols (such as “a://”) are rejected, but this restriction can be circumvented by encoding the protocol (“%61://”), thereby making a four-byte overflow possible.

Exploitability due to the corruption of the adjacent heap block’s header is assumed likely but research is ongoing.

As far as I know there’s no current exploit for this, but it is a possibility.

Source: eEye



Recent in Exploits/Vulnerabilities:
- drozer – The Leading Security Testing Framework For Android
- Twitter Vulnerability Allows Deletion Of Payment Details
- Twitter Bug Bounty Official – Started Paying For Bugs

Related Posts:
- Serious Flaw in Popular Media Players from Microsoft and AOL
- Critical 0-day Vulnerability In Adobe Flash Player, Reader & Acrobat
- At Last – Adobe Launches Sandboxed Flash Player For Firefox

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 227,566 views
- AJAX: Is your application secure enough? - 119,114 views
- eEye Launches 0-Day Exploit Tracker - 85,060 views

Low-cost VPS Hosting

One Response to “Serious Exploit in Windows Media Player (WMP)”

  1. Sypherknife 5 June 2007 at 12:41 pm Permalink

    …”Or alternatively use something decent like Winamp.”

    If only people realised that there are alternatives to shit programs