Gravité: : Medium
  Identifiant(s) CVE: : CVE-2010-1042
  Date du conseil: 25 février 2011

  Description

Microsoft Windows Media Player is prone to a remote memory-corruption vulnerability when handling specially crafted AVI files. An attacker can exploit this issue by enticing an unsuspecting user to open a malicious file with the vulnerable application. A successful exploit may allow arbitrary code to run in the context of the currently logged-in user. Microsoft Windows Media Player 11 does not properly perform colorspace conversion, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .AVI file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

  Information Exposure Rating:

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1004044
  Trend Micro Deep Security DPI Rule Name: 1004044 - Microsoft Windows Media Player AVI File Colorspace Conversion Remote Memory Corruption Vulnerability

  Affected software and version:

  • Microsoft Windows Media Player 11.0.6000.6324
  • Microsoft Windows Media Player 11.0.5721.5145
  • Microsoft Windows Media Player 11