---------------------------------------------------------------------- Want to join the Secunia Security Team? Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports. http://secunia.com/secunia_security_specialist/ ---------------------------------------------------------------------- TITLE: Windows Media Player PNG Processing Buffer Overflow SECUNIA ADVISORY ID: SA20626 VERIFY ADVISORY: http://secunia.com/advisories/20626/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Microsoft Windows Media Player 10.x http://secunia.com/product/4208/ Microsoft Windows Media Player 7.x http://secunia.com/product/1084/ Microsoft Windows Media Player 9.x http://secunia.com/product/1085/ DESCRIPTION: iDefense Labs has reported a vulnerability in Windows Media Player, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the decoding of PNG (Portable Network Graphics) image file chunks. This can be exploited to cause a stack-based buffer overflow via a specially crafted PNG image when a user opens a malicious WMZ file or visits a malicious web site. Successful exploitation allows execution of arbitrary code. SOLUTION: Apply patches. Windows Media Player for XP on Windows XP SP1: http://www.microsoft.com/downloads/details.aspx?FamilyId=11372cc0-3da9-49ad-bb08-1493ce3cd0bd Windows Media Player 9 on Windows XP SP2: http://www.microsoft.com/downloads/details.aspx?FamilyId=c00be4c3-34ba-4858-90d7-520b7d240e33 Windows Media Player 10 on Windows XP Professional x64 Edition: http://www.microsoft.com/downloads/details.aspx?FamilyId=f59065ec-0279-48ec-ab27-8abca715ac01 Windows Media Player 9 on Windows Server 2003: http://www.microsoft.com/downloads/details.aspx?FamilyId=c00be4c3-34ba-4858-90d7-520b7d240e33 Windows Media Player 10 on Windows Server 2003 SP1: http://www.microsoft.com/downloads/details.aspx?FamilyId=4f933b0c-7d2d-4049-92da-bbbe97371594 Windows Media Player 10 on Windows Server 2003 x64 Edition: http://www.microsoft.com/downloads/details.aspx?FamilyId=facc7dfe-9b3b-48dd-a068-5bb9c6b60f87 Windows 98, Windows 98 SE, and Windows Me: Patches are available from the Windows Update web site. Windows Media Player 7.1 on Windows 2000 SP4: http://www.microsoft.com/downloads/details.aspx?FamilyId=5abb6258-9468-4188-a178-aa46f100ab61 Windows Media Player 9 on Windows 2000 SP4 / Windows XP SP1: http://www.microsoft.com/downloads/details.aspx?FamilyId=c00be4c3-34ba-4858-90d7-520b7d240e33 Windows Media Player 10 on Windows XP SP1/SP2: http://www.microsoft.com/downloads/details.aspx?FamilyId=0f641572-74fd-4281-953f-6f2f12e001e0 PROVIDED AND/OR DISCOVERED BY: Greg MacManus, iDefense Labs. ORIGINAL ADVISORY: MS06-024 (KB917734): http://www.microsoft.com/technet/security/Bulletin/MS06-024.mspx iDefense Labs: http://idefense.com/intelligence/vulnerabilities/display.php?id=406 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------