Vulnerabilities > CVE-2003-0228 - Unspecified vulnerability in Microsoft Windows Media Player 7.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Microsoft Windows Media Player 7.1 Skin File Code Execution Vulnerability. CVE-2003-0228. Remote exploit for windows platform |
id | EDB-ID:22570 |
last seen | 2016-02-02 |
modified | 2003-05-07 |
published | 2003-05-07 |
reporter | Jelmer Kuperus |
source | https://www.exploit-db.com/download/22570/ |
title | Microsoft Windows Media Player 7.1 Skin File Code Execution Vulnerability |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS03-017.NASL |
description | The remote host is using a version of Windows Media player that is vulnerable to a directory traversal attack through its handling of |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11595 |
published | 2003-05-07 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11595 |
title | MS03-017: Windows Media Player Skin Download Overflow (817787) |
code |
|
Oval
accepted | 2014-06-30T04:10:59.886-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:321 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2003-11-26T12:00:00.000-04:00 | ||||||||||||
title | Windows Media Player Directory Traversal | ||||||||||||
version | 10 |
References
- http://marc.info/?l=bugtraq&m=105232913516488&w=2
- http://marc.info/?l=bugtraq&m=105232913516488&w=2
- http://marc.info/?l=bugtraq&m=105240528419389&w=2
- http://marc.info/?l=bugtraq&m=105240528419389&w=2
- http://marc.info/?l=ntbugtraq&m=105233960728901&w=2
- http://marc.info/?l=ntbugtraq&m=105233960728901&w=2
- http://www.kb.cert.org/vuls/id/384932
- http://www.kb.cert.org/vuls/id/384932
- http://www.securityfocus.com/bid/7517
- http://www.securityfocus.com/bid/7517
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-017
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-017
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11953
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11953
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A321
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A321