Vulnerabilities > CVE-2004-1244 - Unspecified vulnerability in Microsoft Windows Media Player 9

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus

Summary

Windows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS05-009.NASL
descriptionThe remote host is running either Windows Media Player 9 or MSN Messenger. There is a vulnerability in the remote version of this software that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image and send it to a victim on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id16328
published2005-02-08
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/16328
titleMS05-009: Vulnerability in PNG Processing Could Allow Remote Code Execution (890261)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(16328);
 script_version("1.41");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id("CVE-2004-1244", "CVE-2004-0597");
 script_bugtraq_id(12485, 12506);
 script_xref(name:"MSFT", value:"MS05-009");
 script_xref(name:"CERT", value:"259890");
 script_xref(name:"CERT", value:"388984");
 script_xref(name:"CERT", value:"817368");
 script_xref(name:"EDB-ID", value:"25094");
 script_xref(name:"EDB-ID", value:"393");
 script_xref(name:"EDB-ID", value:"389");
 script_xref(name:"MSKB", value:"885492");
 script_xref(name:"MSKB", value:"887472");

 script_name(english:"MS05-009: Vulnerability in PNG Processing Could Allow Remote Code Execution (890261)");
 script_summary(english:"Checks the version of Media Player");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through the Media
Player.");
 script_set_attribute(attribute:"description", value:
"The remote host is running either Windows Media Player 9 or MSN
Messenger.

There is a vulnerability in the remote version of this software that
could allow an attacker to execute arbitrary code on the remote host.

To exploit this flaw, one attacker would need to set up a rogue PNG
image and send it to a victim on the remote host.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2005/ms05-009");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Windows 2000, XP and
2003.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2004/08/04");
 script_set_attribute(attribute:"patch_publication_date", value:"2005/02/08");
 script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/08");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:msn_messenger");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:windows_media_player");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:windows_messenger");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("smb_func.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS05-009';

kbs = make_list("885492", "887472");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(win2k:'4,5', xp:'1,2', win2003:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

progfile = hotfix_get_programfilesdir();
if (!progfile) exit(1, "Failed to get the Program Files directory.");

share = hotfix_path2share(path:progfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  hotfix_is_vulnerable(os:"5.2", sp:0, file:"Wmp.dll", version:"9.0.0.3250", min_version:"9.0.0.0", dir:"\system32", bulletin:bulletin, kb:'885492') ||
  hotfix_is_vulnerable(os:"5.2", file:"Msmsgs.exe", version:"5.1.0.639", min_version:"5.1.0.0", path:progfile, dir:"\Messenger") ||
  hotfix_is_vulnerable(os:"5.1", sp:1, file:"Wmp.dll", version:"9.0.0.3250", min_version:"9.0.0.0", dir:"\system32", bulletin:bulletin, kb:'885492') ||
  hotfix_is_vulnerable(os:"5.1", sp:1, file:"Msmsgs.exe", version:"4.7.0.2010", min_version:"4.7.0.0", path:progfile, dir:"\Messenger", bulletin:bulletin, kb:'887472') ||
  hotfix_is_vulnerable(os:"5.1", sp:2, file:"Msmsgs.exe", version:"4.7.0.3001", min_version:"4.7.0.3000", path:progfile, dir:"\Messenger", bulletin:bulletin, kb:'887472') ||
  hotfix_is_vulnerable(os:"5.1", file:"Msmsgs.exe", version:"5.1.0.639", min_version:"5.1.0.0", path:progfile, dir:"\Messenger") ||
  hotfix_is_vulnerable(os:"5.0", file:"Msmsgs.exe", version:"5.1.0.639", min_version:"5.1.0.0", path:progfile, dir:"\Messenger") ||
  hotfix_is_vulnerable(os:"5.0", file:"Wmp.dll", version:"9.0.0.3250", min_version:"9.0.0.0", dir:"\system32", bulletin:bulletin, kb:'885492')
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

  • accepted2008-02-25T04:00:05.690-05:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJohn Hoyland
      organizationCentennial Software
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    descriptionWindows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:1306
    statusaccepted
    submitted2005-02-16T12:00:00.000-04:00
    titleWindows XP Media Player PNG Processing Vulnerability
    version68
  • accepted2008-02-25T04:00:07.189-05:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJohn Hoyland
      organizationCentennial Software
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    descriptionWindows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:1568
    statusaccepted
    submitted2005-02-22T12:00:00.000-04:00
    titleServer 2003 Media Player PNG Processing Vulnerability
    version68
  • accepted2008-02-25T04:00:08.047-05:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJohn Hoyland
      organizationCentennial Software
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    • nameJeff Cheng
      organizationHewlett-Packard
    descriptionWindows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:2379
    statusaccepted
    submitted2005-02-22T12:00:00.000-04:00
    titleWindows 2000 Media Player PNG Processing Vulnerability
    version68