Re: [Full-disclosure] security notice: Backdooring Windows Media Files

Hi pdp!

Great admirer of your work :) I just wanted to inform you that I have
tested your claim, on a fully patched/updated Win XP SP2 system with an
admin account logged in, and was warned sufficiently(asked whether I
wanted to play asx files, then asked if I was sure by Media Player, then
pop-up was blocked by IE), while the page you tried to produce was
blocked via IE's pop-up blocker.

You can see/confirm this by viewing these screenshots:
( )

( )

This was tested on a plain/manila/vanilla version of XP SP2. All I did
was update/upgrade to latest available from M$ Update.

Aras Memisyazici
IT/Security/Dev. Specialist

Outreach Information Services
Virginia Tech

-----Original Message-----
From: pdp (architect) [mailto:pdp.gnucitizen@xxxxxxxxxxxxxx]
Sent: Tuesday, September 18, 2007 11:58 AM
To: bugtraq@xxxxxxxxxxxxxxxxx; full-disclosure@xxxxxxxxxxxxxxxxx
Subject: security notice: Backdooring Windows Media Files

It is very easy to put some HTML inside files supported by Window
Media Player. The interesting thing is that these HTML pages run in
less restrictive IE environment. I found that a fully patched windows
XP SP2 with IE6 or IE7 and Windows Media Player 9 (default) will open
any page of your choice in IE even if your default browser is Firefox,
Opera or anything else you have in place. It means that even if you
are running Firefox and you think that you are secure, by simply
opening a media file, you expose yourself to all IE vulnerabilities
there might be. Plus, attackers can perform very very interesting
phishing attacks. I prepared a simple POC which spawns a browser
window in full screen mode... Think about how easy it is going to be
to fake the windows logout - login sequence and phish unaware users'

On the other hand Media Player 11 (Vista by default) is not exposed to
these attacks.

pdp (architect) | petko d. petkov

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -