Microsoft Windows Media Player PBG File Processing Overflow (917734)

medium Nessus Network Monitor Plugin ID 3651

Synopsis

Arbitrary code can be executed on the remote host through the Media Player.

Description

The remote host is running Microsoft Windows Media Player version 9. There is a vulnerability in the remote version of this software that may allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to be able to convince a user to open a malicious media resource using the vulnerable player.

Solution

Patch or upgrade according to vendor recommendations.

See Also

http://www.microsoft.com/technet/security/bulletin/ms06-024.mspx

Plugin Details

Severity: Medium

ID: 3651

Family: Generic

Published: 6/13/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.7

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:windows_media_player

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2006-0025

BID: 18385