Vulnerabilities > CVE-2011-0032 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Untrusted search path vulnerability in DirectShow in Microsoft Windows Vista SP1 and SP2, Windows 7 Gold and SP1, Windows Server 2008 R2 and R2 SP1, and Windows Media Center TV Pack for Windows Vista allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Digital Video Recording (.dvr-ms), Windows Recorded TV Show (.wtv), or .mpg file, aka "DirectShow Insecure Library Loading Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 8 | |
Application | 1 |
Msbulletin
bulletin_id | MS11-015 |
bulletin_url | |
date | 2011-03-08T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2510030 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Windows Media Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-015.NASL |
description | The remote Windows host has at least one of the following vulnerabilities in Media Player or Media Center : - DirectShow does not adequately restrict the path used for loading external libraries. A remote attacker could exploit this by tricking a user into opening a specially crafted file, resulting in arbitrary code execution. (CVE-2011-0032) - There is an unspecified code execution vulnerability when Media Player and Media Center attempt to open specially crafted .dvr-ms files. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 52583 |
published | 2011-03-08 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/52583 |
title | MS11-015: Vulnerabilities in Windows Media Could Allow Remote Code Execution (2510030) |
Oval
accepted | 2014-03-03T04:00:30.852-05:00 | ||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||
description | Untrusted search path vulnerability in DirectShow in Microsoft Windows Vista SP1 and SP2, Windows 7 Gold and SP1, Windows Server 2008 R2 and R2 SP1, and Windows Media Center TV Pack for Windows Vista allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Digital Video Recording (.dvr-ms), Windows Recorded TV Show (.wtv), or .mpg file, aka "DirectShow Insecure Library Loading Vulnerability." | ||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:12506 | ||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||
submitted | 2011-03-08T14:00:00 | ||||||||||||||||||||||||||||||||||||||||
title | DirectShow Insecure Library Loading Vulnerability | ||||||||||||||||||||||||||||||||||||||||
version | 76 |
References
- http://osvdb.org/71015
- http://secunia.com/advisories/43626
- http://www.securityfocus.com/bid/46682
- http://www.securitytracker.com/id?1025170
- http://www.us-cert.gov/cas/techalerts/TA11-067A.html
- http://www.vupen.com/english/advisories/2011/0615
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12506
- http://osvdb.org/71015
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12506
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015
- http://www.vupen.com/english/advisories/2011/0615
- http://www.us-cert.gov/cas/techalerts/TA11-067A.html
- http://www.securitytracker.com/id?1025170
- http://www.securityfocus.com/bid/46682
- http://secunia.com/advisories/43626