Microsoft Windows媒体播放器服务拒绝漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1106015 漏洞类型 未知
发布时间 2000-09-26 更新时间 2005-10-12
CVE编号 CVE-2000-0929 CNNVD-ID CNNVD-200012-157
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20240
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200012-157
|漏洞详情
MicrosoftWindowsMediaPlayer7版本存在漏洞。攻击者借助不能正确关闭的嵌入OCX控件导致RTF格式功能电子邮件客户端的服务拒绝,又称为“OCX附件”漏洞。
|漏洞EXP
source: http://www.securityfocus.com/bid/1714/info

Due to a flaw in the method Microsoft Windows Media Player 7 handles OCX controls (ActiveX containers) in embedded in RTF email messages, it is possible to crash RTF-enabled email clients such as Microsoft Outlook and Outlook Express. While this vulnerability lies in the OCX control implementation in Windows Media Player 7, it only affects RTF-enabled email clients.

If a user of Outlook or Outlook Express were to receive an RTF email containing an embedded OCX control associated with Windows Media Player 7, the client would fail when the message was closed. Restarting the application would be required in order to regain normal functionality. In addition, deleting the offending email would resume normal operations of the email client. The functionality of Windows Media Player 7 would not be affected in any way. 

Binary - 20240-1.exe
Source - 20240-2.zip 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20240-1.exe

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20240-2.zip
|参考资料

来源:XF
名称:mediaplayer-outlook-dos
链接:http://xforce.iss.net/static/5309.php
来源:BID
名称:1714
链接:http://www.securityfocus.com/bid/1714
来源:MS
名称:MS00-068
链接:http://www.microsoft.com/technet/security/bulletin/ms00-068.asp
来源:BUGTRAQ
名称:20000929MalformedEmbeddedWindowsMediaPlayer7"OCXAttachment"
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=97024839222747&w=2