Feeds

MS patches Media Player secure music vulnerability

Oops...

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Microsoft has issued a cumulative patch for Windows Media Player designed to patch three vulnerabilities, the most serious of which might permit an attacker to run arbitrary code on a victim's PC.

An advisory by Microsoft says that the most serious of the three problems is an information disclosure vulnerability, which it rates as severe.

The vulnerability results because of a flaw in how Windows Media Player handles certain types of licenses for secure media files when the media file is stored in the IE cache. Specifically, when a type of secure Windows Media file is opened, the media player erroneously returns information to the server that discloses the location of the IE cache.

If the attacker were able to cause an executable program to be stored in the cache, the location information obtained by this vulnerability could then be used to access content in the cache directly and bypass IE's cache security mechanisms. Attacks could be made using either maliciously constructed Web pages or HTML mails.

The patch also addresses a less severe privilege elevation bug which might enable an attacker who can physically log on locally to a Windows 2000 machine and run a program to obtain the same rights as the operating system.

Then there's a still less severe script execution vulnerability, which Microsoft says would be very difficult to exploit in practice because it involves tricking a victim into playing a specially formed media file and then viewing a maliciously constructed Web page.

With the patch, Microsoft has introduced a configuration change relating to file extensions associated with Windows Media Player. It is also debuting an optional security configuration feature for users who want to disable scripting functionality in Windows Media Player versions 7.x or higher. ®

Related Stories

RealNetworks the Buffer Slayer
Windows Media Player must be patched to fix IE

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Slap for SnapChat web app in SNAP mishap: '200,000' snaps sapped
This is what happens if you hand your username and password to a 3rd-party
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.