CVE-2006-6134

Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
References
Link Resource
http://blogs.technet.com/msrc/archive/2006/12/07/public-proof-of-concept-code-for-asx-file-format-isssue.aspx
http://research.eeye.com/html/alerts/zeroday/20061122.html
http://secunia.com/advisories/22971 Vendor Advisory
http://securityreason.com/securityalert/1922
http://securitytracker.com/id?1017354
http://support.avaya.com/elmodocs2/security/ASA-2006-274.htm
http://www.kb.cert.org/vuls/id/208769 US Government Resource
http://www.securityfocus.com/archive/1/452352/100/0/threaded
http://www.securityfocus.com/archive/1/453579/100/0/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/bid/21247 Exploit
http://www.us-cert.gov/cas/techalerts/TA06-346A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4882 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A669
http://blogs.technet.com/msrc/archive/2006/12/07/public-proof-of-concept-code-for-asx-file-format-isssue.aspx
http://research.eeye.com/html/alerts/zeroday/20061122.html
http://secunia.com/advisories/22971 Vendor Advisory
http://securityreason.com/securityalert/1922
http://securitytracker.com/id?1017354
http://support.avaya.com/elmodocs2/security/ASA-2006-274.htm
http://www.kb.cert.org/vuls/id/208769 US Government Resource
http://www.securityfocus.com/archive/1/452352/100/0/threaded
http://www.securityfocus.com/archive/1/453579/100/0/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/bid/21247 Exploit
http://www.us-cert.gov/cas/techalerts/TA06-346A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4882 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A669
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:windows_media_player:10.00.00.4036:*:*:*:*:*:*:*

History

21 Nov 2024, 00:21

Type Values Removed Values Added
References () http://blogs.technet.com/msrc/archive/2006/12/07/public-proof-of-concept-code-for-asx-file-format-isssue.aspx - () http://blogs.technet.com/msrc/archive/2006/12/07/public-proof-of-concept-code-for-asx-file-format-isssue.aspx -
References () http://research.eeye.com/html/alerts/zeroday/20061122.html - () http://research.eeye.com/html/alerts/zeroday/20061122.html -
References () http://secunia.com/advisories/22971 - Vendor Advisory () http://secunia.com/advisories/22971 - Vendor Advisory
References () http://securityreason.com/securityalert/1922 - () http://securityreason.com/securityalert/1922 -
References () http://securitytracker.com/id?1017354 - () http://securitytracker.com/id?1017354 -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-274.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-274.htm -
References () http://www.kb.cert.org/vuls/id/208769 - US Government Resource () http://www.kb.cert.org/vuls/id/208769 - US Government Resource
References () http://www.securityfocus.com/archive/1/452352/100/0/threaded - () http://www.securityfocus.com/archive/1/452352/100/0/threaded -
References () http://www.securityfocus.com/archive/1/453579/100/0/threaded - () http://www.securityfocus.com/archive/1/453579/100/0/threaded -
References () http://www.securityfocus.com/archive/1/454969/100/200/threaded - () http://www.securityfocus.com/archive/1/454969/100/200/threaded -
References () http://www.securityfocus.com/bid/21247 - Exploit () http://www.securityfocus.com/bid/21247 - Exploit
References () http://www.us-cert.gov/cas/techalerts/TA06-346A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-346A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/4882 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4882 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A669 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A669 -

Information

Published : 2006-11-28 01:07

Updated : 2024-11-21 00:21


NVD link : CVE-2006-6134

Mitre link : CVE-2006-6134

CVE.ORG link : CVE-2006-6134


JSON object : View

Products Affected

microsoft

  • windows_media_player
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer