Vulnerabilities > CVE-2010-3138
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
OS | 1 |
Exploit-Db
description Mediaplayer Classic 1.3.2189.0 DLL Hijacking Exploit (iacenc.dll). CVE-2010-3138. Local exploit for windows platform file exploits/windows/local/14765.c id EDB-ID:14765 last seen 2016-02-01 modified 2010-08-25 platform windows port published 2010-08-25 reporter Encrypt3d.M!nd source https://www.exploit-db.com/download/14765/ title Mediaplayer Classic 1.3.2189.0 - DLL Hijacking Exploit iacenc.dll type local description Media Player Classic 6.4.9.1 DLL Hijacking Exploit (iacenc.dll). CVE-2010-3138. Local exploit for windows platform file exploits/windows/local/14788.c id EDB-ID:14788 last seen 2016-02-01 modified 2010-08-25 platform windows port published 2010-08-25 reporter LiquidWorm source https://www.exploit-db.com/download/14788/ title Media Player Classic 6.4.9.1 DLL Hijacking Exploit iacenc.dll type local
Msbulletin
bulletin_id | MS12-014 |
bulletin_url | |
date | 2012-02-14T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2661637 |
knowledgebase_url | |
severity | Important |
title | Vulnerability in Indeo Codec Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS12-014.NASL |
description | The remote Windows XP host contains a version of the Indeo codec that is affected by an insecure library loading vulnerability. A remote attacker could exploit this by tricking a user into opening a legitimate file (e.g., an .avi file) located in the same directory as a maliciously crafted dynamic link library (DLL) file, resulting in arbitrary code execution. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 57948 |
published | 2012-02-14 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/57948 |
title | MS12-014: Vulnerability in Indeo Codec Could Allow Remote Code Execution (2661637) |
code |
|
Oval
accepted | 2012-03-12T04:00:45.706-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information. | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:7132 | ||||||||
status | accepted | ||||||||
submitted | 2010-09-23T15:01:11 | ||||||||
title | Indeo Codec Insecure Library Loading Vulnerability | ||||||||
version | 75 |
References
- http://osvdb.org/67588
- http://osvdb.org/67588
- http://secunia.com/advisories/41114
- http://secunia.com/advisories/41114
- http://www.exploit-db.com/exploits/14765
- http://www.exploit-db.com/exploits/14765
- http://www.exploit-db.com/exploits/14788
- http://www.exploit-db.com/exploits/14788
- http://www.us-cert.gov/cas/techalerts/TA12-045A.html
- http://www.us-cert.gov/cas/techalerts/TA12-045A.html
- http://www.vupen.com/english/advisories/2010/2190
- http://www.vupen.com/english/advisories/2010/2190
- http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php
- http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132