|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Windows Media Player: buffer overflow via a PNG image
Synthesis of the vulnerability
An attacker can create a malicious PNG image leading to code execution when it is displayed by Windows Media Player.
Vulnerable software: Windows 2000, Windows 2003, Windows 98, Windows ME, Windows XP.
Severity of this announce: 4/4.
Consequences of an intrusion: user access/rights.
Attacker's origin: document.
Creation date: 14/06/2006.
Références of this computer vulnerability: 225, 917734, BID-18385, CERTA-2006-AVI-238, CVE-2006-0025, iDefense Security Advisory 06.13.06, MS06-024, VIGILANCE-VUL-5911, VU#608020.
Description of the vulnerability
The PNG image format (Portable Network Graphics) is frequently used on internet because it does not depend on patents.
The Windows Media Player software displays multimedia contents. This software can display PNG images coming from ASX of skin files for example.
However, when a PNG image is opened, some chunks are copied in a fixed size buffer. This leads to an overflow.
This vulnerability therefore permits an attacker to run code when a malicious multimedia content is opened.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a computers vulnerabilities watch. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce vulnerability database contains several thousand vulnerabilities.