CERT-In Vulnerability Note
CIVN-2010-0257
Remote Code Execution Vulnerability in Microsoft Windows Media Encoder
Original Issue Date:December 15, 2010
Severity Rating: MEDIUM
Systems Affected
- Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Vista Service Pack 1
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 1
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems
- Windows Server 2008 for x64-based Systems Service Pack 2
Component Affected
- Windows Media Encoder 9 x86
- Windows Media Encoder 9 x64
Overview
A remote code execution vulnerability has been reported in Microsoft Media Encoder which could allow an attacker to execute a arbitrary code and take complete control of the affected system in the context of logged in user.
Description
Windows Media Encoder is an application that allows content developers to convert or capture both live and prerecorded audio, video, and computer screen images to Windows Media formats for live and on-demand delivery.
This vulnerability exists in Microsoft Windows Media Encoder due to the way it handles the loading of DLL files . A remote user can create a specially crafted DLL file on a remote share (e.g., WebDAV, SMB share) and convince the user to open the specially crafted file. Successful exploitation of this vulnerability could allow an attacker to execute an arbitrary code and take complete control the affected system in the context of the logged in user.
Workaround
- Disable loading of libraries from WebDAV and remote network shares
- Disable the WebClient service
- Block TCP ports 139 and 445 at the firewall
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS10-094
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx
References
VUPEN Security
http://www.vupen.com/english/advisories/2010/3217
SecurityFocus
http://www.securityfocus.com/bid/42855
SecurityTracker
www.securitytracker.com/id?1024876.html
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx
CVE Name
CVE-2010-3965
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|