Security Hole Found in Windows Media Player

Dec 8, 2006

Security Hole Found in Windows Media Player

Microsoft is investigating a new vulnerability in Windows Media Player that 
could be used to run malicious code on a user's PC.

James Niccolai, IDG News Service

Friday, December 08, 2006 08:00 AM PST

Users are being advised to disable a certain type of file in Microsoft's 
Windows Media Player software following the discovery of a new security hole in
the software.

Windows Media Player versions 9 and 10 are affected by the flaw, which could 
allow a malicious hacker to run unauthorized software on a victim's PC or cause
a denial of service attack, according to security company FrSIRT, which rated 
the problem critical in
an advisory Thursday .

The flaw is due to a buffer overflow error that can occur when Windows Media 
Player is used to run ".asx" media files, according to a
warning from eEye Digital Security .

Such files open automatically in a Web browser, meaning a hacker would need 
only to post an infected .asx file in a Web page and then try to lure users
to visit the page, eEye Digital said. An infected file could also be sent via 
email, in which case users would need to be persuaded to open it.

Microsoft said an initial investigation revealed that the "proof of concept" 
code could allow an attacker to execute code on a user's machine. It said it
was unaware of any attempts to exploit the
vulnerability ,
and it was unclear Friday morning if the proof of concept code it referred to 
was in the hands of hackers.

Users can protect against the vulnerability in Internet Explorer by preventing 
it from opening .asx files automatically. Turning off Active Scripting would
also greatly reduce, but not eliminate, the risk, Microsoft said. FrSIRT also 
recommended that users
upgrade to Windows Media Player 11 ,
which it said is not affected.

Microsoft was still determining Friday whether it needed to issue an "out of 
cycle" security fix for the problem or patch it with its next monthly software
update.

Zero-Day Exploit

The flaw was
originally reported
on Nov. 22, when it was identified only as a denial-of-service issue.

Some discussion boards described the problem as a "zero-day exploit," although 
it was unclear if that was the case. Zero-day exploits occur when exploit
code is released on the same day that a flaw is uncovered, giving users no time 
to protect themselves.

It's been another busy week for Microsoft's security teams. On Tuesday the 
company warned of an
unpatched vulnerability in Word
that had been the subject of what it called "limited attacks." And on Thursday 
it said it was readying several
patches for Visual Studio
and Windows that it plans to release next week.

The patches currently due for next week do not address the problems with Word 
and Windows Media Player.

http://www.pcworld.com/article/id,128119-pg,1/article.html

Vikas Kapoor,
MSN ID:
[EMAIL PROTECTED]
Yahoo ID:
[EMAIL PROTECTED]
Skype ID: dl_vikas
Mobile: (+91) 9891098137.
To unsubscribe send a message to [EMAIL PROTECTED] with the subject unsubscribe.

To change your subscription to digest mode or make any other changes, please 
visit the list home page at
  http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in

Reply via email to