CERT-In Vulnerability Note
CIVN-2010-0226
Microsoft Windows Media Player Real Time Streaming Protocol (RTSP) Use After Free Vulnerability
Original Issue Date:October 15, 2010
Severity Rating: HIGH
Systems Affected
- Windows Vista Service Pack 1 and Service Pack 2
- Windows Vista x64 Edition Service Pack 1 and Service Pack 2
- Windows 7 for 32-bit Systems
- Windows 7 for x64-based Systems
Overview
A vulnerability has been reported in Microsoft Windows Media Player versions 11 and 12 Network Sharing Service that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
Description
The Real Time Streaming Protocol (RTSP) is an application-level protocol for control over the delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video. Sources of data can include both live data feeds and stored clips. This protocol is intended to control multiple data delivery sessions, provide a means for choosing delivery channels such as UDP, multicast UDP and TCP, and provide a means for choosing delivery mechanisms based upon RTP (RFC 1889). This vulnerability is caused due to improper handling of malformed RTSP packets by the Windows Media Player Network Sharing Service. The Network Sharing Service allows devices on the network to access shared content on the system.
An unauthenticated, remote attacker could exploit this vulnerability by sending malicious RTSP packets to the targeted device/system installed with vulnerable version of media player. While processing, the packets could cause an error condition that the attacker could take advantage to execute arbitrary code with the elevated privileges of the Network Sharing Service.
Workaround
- Disable Windows Media Player Network Sharing Service on affected systems
- Do not click on unknown or untrusted video streaming links
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS10-075
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-075.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-075.mspx
Security Tracker
http://securitytracker.com/alerts/2010/Oct/1024545.html
CISCO
http://tools.cisco.com/security/center/viewAlert.x?alertId=21475
VUPEN
http://www.vupen.com/english/advisories/2010/2622
ZDI
http://www.zerodayinitiative.com/advisories/ZDI-10-199/
F-Secure
http://www.f-secure.com/vulnerabilities/en/SA201006530
Secunia
http://secunia.com/advisories/41776
CVE Name
CVE-2010-3225
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|