CVE-2000-1113
CVSS7.5
发布时间 :2001-01-09 00:00:00
修订时间 :2008-09-05 16:22:41
NMCOE    

[原文]Buffer overflow in Microsoft Windows Media Player allows remote attackers to execute arbitrary commands via a malformed Active Stream Redirector (.ASX) file, aka the ".ASX Buffer Overrun" vulnerability.


[CNNVD]Microsoft Windows Media Player缓冲区溢出漏洞(CNNVD-200101-077)

        Microsoft Windows Media Player存在缓冲区溢出漏洞。远程攻击者借助畸形的 Active Stream Redirector (.ASX)文件执行任意命令。又称为".ASX Buffer Overrun"漏洞。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:windows_media_player:6.4Microsoft windows_media_player 6.4
cpe:/a:microsoft:windows_media_player:7Microsoft windows_media_player 7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1113
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1113
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200101-077
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1980
(VENDOR_ADVISORY)  BID  1980
http://www.microsoft.com/technet/security/bulletin/MS00-090.asp
(VENDOR_ADVISORY)  MS  MS00-090
http://xforce.iss.net/static/5574.php
(UNKNOWN)  XF  mediaplayer-asx-bo
http://www.atstake.com/research/advisories/2000/a112300-1.txt
(UNKNOWN)  ATSTAKE  A112300-1

- 漏洞信息

Microsoft Windows Media Player缓冲区溢出漏洞
高危 缓冲区溢出
2001-01-09 00:00:00 2005-10-12 00:00:00
远程  
        Microsoft Windows Media Player存在缓冲区溢出漏洞。远程攻击者借助畸形的 Active Stream Redirector (.ASX)文件执行任意命令。又称为".ASX Buffer Overrun"漏洞。

- 公告与补丁

        

- 漏洞信息 (20427)

Microsoft Windows Media Player 7.0 .ASX Buffer Overflow Vulnerability (EDBID:20427)
windows remote
2000-11-22 Verified
0 @stake
N/A [点击下载]
source: http://www.securityfocus.com/bid/1980/info

Windows Media Player is an application used for digital audio, and video content viewing. An unsafe buffer copy involving remotely-obtained data exists in the Active Stream Redirector (ASX) component in Windows Media Player. The ASX enables a user to play streaming media residing on an intranet or external site. .ASX files are metafiles that redirect streaming media content from a browser to Windows Media Player.

The contents of ASX files, when being interpreted by Windows Media Player, are copied into memory buffers for run-time use. When this data is copied, it is not ensured that the amount of data copied is within the predefined size limits. As a result, any extraneous data will be copied over memory boundaries and can overwrite neighbouring memory on the program's stack.

Depending on the data that is copied, a denial of service attack could be launched or arbitrary code could be executed on the target host. Windows Media Player runs in the security context of the user currently logged on, therefore arbitrary code would be run at the privilege level of that particular user. If random data were entered into the buffer, the application would crash and restarting the application is required in order to regain normal functionality.

If a user was misled to download a hostile .ASX file to the local machine, they would only have to single click on the file within Windows Explorer to activate the code. This is due to the 'Web View' option that is used by Windows Explorer to preview web documents automatically while browsing (this feature is enabled by default). In addition, a malformed .ASX file could be embedded into a HTML document and be configured to execute when opened via a browser or HTML compliant email client.

http://www.exploit-db.com/sploits/20427.zip		

- 漏洞信息

1658
Microsoft Windows Media Player .ASX File Handling Overflow
Context Dependent Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2000-11-22 Unknow
2000-11-22 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站