Vulnerabilities > CVE-2010-3225 - Resource Management Errors vulnerability in Microsoft Windows 7 and Windows Vista
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in the Media Player Network Sharing Service in Microsoft Windows Vista SP1 and SP2 and Windows 7 allows remote attackers to execute arbitrary code via a crafted Real Time Streaming Protocol (RTSP) packet, aka "RTSP Use After Free Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS10-075 |
bulletin_url | |
date | 2010-10-12T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2281679 |
knowledgebase_url | |
severity | Critical |
title | Vulnerability in Media Player Network Sharing Service Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS10-075.NASL |
description | A use-after-free vulnerability exists in the Microsoft Windows Media Player Network Sharing Service installed on the remote host. By sending a specially crafted Real Time Streaming Protocol (RTSP) packet to the affected service, a remote attacker may be able to leverage this vulnerability to execute arbitrary code in the security context of the Network Service account. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 49952 |
published | 2010-10-13 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/49952 |
title | MS10-075: Vulnerability in Media Player Network Sharing Service Could Allow Remote Code Execution (2281679) |
code |
|
Oval
accepted | 2010-11-29T04:00:13.552-05:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Use-after-free vulnerability in the Media Player Network Sharing Service in Microsoft Windows Vista SP1 and SP2 and Windows 7 allows remote attackers to execute arbitrary code via a crafted Real Time Streaming Protocol (RTSP) packet, aka "RTSP Use After Free Vulnerability." | ||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:6684 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2010-08-10T13:00:00 | ||||||||||||||||||||||||
title | RTSP Use After Free Vulnerability | ||||||||||||||||||||||||
version | 71 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 43776 CVE ID: CVE-2010-3225 Windows Media Player是微软操作系统中默认捆绑的媒体播放器。 Windows Media Player对同一网络中其他设备的流媒体支持方式存在释放后使用漏洞。如果向播放器的流媒体服务例程发送了特制的RTSP请求,播放器就会释放一个对象之后再重新使用,这可能导致执行任意代码。 Microsoft Windows Media Player 11 临时解决方法: * 在受影响的系统上禁用Windows媒体播放器网络共享服务。 交互方法 1. 单击“开始”,单击“运行”,在“打开”框中键入Regedit,然后单击“确定”。 2. 找到并随后选择下列注册表项: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WMPNetworkSvc 3. 单击“文件”菜单,然后单击“导出”。 4. 在“导出注册表文件”对话框中,输入WMPNetworkSvc_Backup.reg,然后单击“保存”。 注意:默认情况下,此操作将在“我的文档”文件夹中创建此注册表项的备份。 5. 在注册表编辑器的右窗格中选择值“启动”。按回车编辑注册表项的值。将“值”数据字段更改为4,并按回车。 6. 在提升的命令提示符下,输入以下命令停止此服务: sc stop WMPNetworkSvc 被管理的部署脚本 1. 使用下列命令创建注册表项副本: regedit /e WMPNetworkSvc_Backup.reg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WMPNetworkSvc 2. 将下列内容保存到扩展名为.REG 的文件(如 Disable_WMPNetworkSvc.reg): Windows Registry Editor Version 5.00 HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\service_name] Start"=dword:00000004 3. 在目标计算机上,使用下列命令运行在步骤2中创建的注册表脚本: Regedit /s Disable_WMPNetworkSvc.reg 4. 在提升的命令提示符下,输入以下命令停止此服务: sc stop WMPNetworkSvc 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS10-075)以及相应补丁: MS10-075:Vulnerability in Media Player Network Sharing Service Could Allow Remote Code Execution (2281679) 链接:http://www.microsoft.com/technet/security/bulletin/MS10-075.mspx?pf=true |
id | SSV:20171 |
last seen | 2017-11-19 |
modified | 2010-10-15 |
published | 2010-10-15 |
reporter | Root |
title | Microsoft Windows Media Player网络共享服务RTSP释放后使用漏洞(MS10-075) |
References
- http://www.us-cert.gov/cas/techalerts/TA10-285A.html
- http://www.us-cert.gov/cas/techalerts/TA10-285A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-075
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-075
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6684
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6684