Alert: Microsoft Security Bulletin MS06-006 - Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution (911564)



Microsoft Security Bulletin MS06-006:
Vulnerability in Windows Media Player Plug-in with Non-Microsoft
Internet Browsers Could Allow Remote Code Execution (911564)

Bulletin URL:
<http://www.microsoft.com/technet/security/Bulletin/MS06-006.mspx>

Version Number: 1.0
Issued Date: Tuesday, February 14, 2006
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important
Patch(es) Replaced: None
Caveats: None

Tested Software:
Affected Software:
------------------
* Microsoft Windows 2000 Service Pack 4
<http://tinyurl.com/7bozr>
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service
Pack 2
<http://tinyurl.com/7bozr>
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003
Service Pack 1
<http://tinyurl.com/7bozr>
* Microsoft Windows XP Professional x64 Edition and Microsoft Windows
Server 2003 x64 Edition
<http://tinyurl.com/atf2v>
* Microsoft Windows Server 2003 x64 Edition Windows Server 2003 (all
versions)
<http://tinyurl.com/943at>

Technical Description:
----------------------
* Windows Media Player Plug-in Vulnerability - CVE-2006-0005 A remote
code execution vulnerability exists in the Windows Media Player plug-in
for non-Microsoft Internet browsers because of the way the Windows Media
Player plug-in handles a malformed EMBED element. An attacker could
exploit the vulnerability by constructing a malicious EMBED element that
could potentially allow remote code execution if a user visited a
malicious Web site. An attacker who successfully exploited this
vulnerability could take complete control of an affected system.

This email is sent to NTBugtraq automagically as a service to my
subscribers. (v4.01.2194.14842)

Cheers,
Russ Cooper - Senior Scientist - Cybertrust/NTBugtraq Editor

--
NTBugtraq Editor's Note:

Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
--



Relevant Pages

  • SecurityFocus Microsoft Newsletter #228
    ... RaidenHTTPD Remote File Disclosure Vulnerability ... Microsoft Outlook Web Access Login Form Remote URI Redirecti... ... Microsoft Windows Hyperlink Object Library Buffer Overflow V... ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #138
    ... Nessus LibNASL Arbitrary Code Execution Vulnerability ... Blackmoon FTP Server Username Information Disclosure... ... Microsoft Windows Media Player Automatic File Download and... ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #177
    ... RobotFTP Server Username Buffer Overflow Vulnerability ... Ipswitch IMail Server Remote LDAP Daemon Buffer Overflow Vul... ... Microsoft Windows XP Help And Support Center Interface Spoof... ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #446
    ... MICROSOFT VULNERABILITY SUMMARY ... DESlock+ 'dlpcrypt.sys' Local Privilege Escalation Vulnerability ... Apple Safari for Windows Private Browsing Cookie Data Local Information Disclosure ... Apple Safari CoreGraphics TrueType Font Handling Remote Code Execution Vulnerability ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #158
    ... Gamespy 3d IRC Client Remote Buffer Overflow Vulnerability ... Microsoft Windows PostThreadMessage() Arbitrary Process Kill... ...
    (Focus-Microsoft)