Alert: Microsoft Security Bulletin MS06-006 - Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution (911564)



Microsoft Security Bulletin MS06-006:
Vulnerability in Windows Media Player Plug-in with Non-Microsoft
Internet Browsers Could Allow Remote Code Execution (911564)

Bulletin URL:
<http://www.microsoft.com/technet/security/Bulletin/MS06-006.mspx>

Version Number: 1.0
Issued Date: Tuesday, February 14, 2006
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important
Patch(es) Replaced: None
Caveats: None

Tested Software:
Affected Software:
------------------
* Microsoft Windows 2000 Service Pack 4
<http://tinyurl.com/7bozr>
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service
Pack 2
<http://tinyurl.com/7bozr>
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003
Service Pack 1
<http://tinyurl.com/7bozr>
* Microsoft Windows XP Professional x64 Edition and Microsoft Windows
Server 2003 x64 Edition
<http://tinyurl.com/atf2v>
* Microsoft Windows Server 2003 x64 Edition Windows Server 2003 (all
versions)
<http://tinyurl.com/943at>

Technical Description:
----------------------
* Windows Media Player Plug-in Vulnerability - CVE-2006-0005 A remote
code execution vulnerability exists in the Windows Media Player plug-in
for non-Microsoft Internet browsers because of the way the Windows Media
Player plug-in handles a malformed EMBED element. An attacker could
exploit the vulnerability by constructing a malicious EMBED element that
could potentially allow remote code execution if a user visited a
malicious Web site. An attacker who successfully exploited this
vulnerability could take complete control of an affected system.

This email is sent to NTBugtraq automagically as a service to my
subscribers. (v4.01.2194.14842)

Cheers,
Russ Cooper - Senior Scientist - Cybertrust/NTBugtraq Editor

--
NTBugtraq Editor's Note:

Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
--