TITLE: Windows Media Player Hosted Media Content Handling Vulnerability Highly critical Impact: System access Where: From remote VERIFY ADVISORY: http://secunia.com/advisories/39380/ DESCRIPTION: A vulnerability has been reported in Windows Media Player, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a use-after-free error in the Windows Media Player ActiveX control when retrieving a codec for an unknown fourCC compression code. This can be exploited by tricking a user into accessing a web page hosting media content where the control is removed from the page while the codec is requested from Microsoft. Successful exploitation allows execution of arbitrary code. SOLUTION: Apply patches. Windows 2000 SP4: http://www.microsoft.com/downloads/details.aspx?familyid=C0B8B362-A321-4AC9-BE98-15C71BB7A043 Windows XP SP2: http://www.microsoft.com/downloads/details.aspx?familyid=5C748C6D-84D1-45A9-8A33-9372EB5504D5 Windows XP SP3: http://www.microsoft.com/downloads/details.aspx?familyid=9E4277B4-2DC5-4163-A6AA-7E07DD32B721 ORIGINAL ADVISORY: MS10-027 (KB979402): http://www.microsoft.com/technet/security/bulletin/MS10-027.mspx ZDI: http://www.zerodayinitiative.com/advisories/ZDI-10-070/ ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-