Critical Update Released for Windows Media Player
- By Scott Bekker
- November 21, 2001
Microsoft alerted users Tuesday to a critical vulnerability in its Windows Media Player that could allow attackers to run the code of their choice on users' machines. A patch is available.
The problem affects Windows Media Player 6.4, a two-year-old version of the software. However, Microsoft notes that version 7.0 and the more recent 7.1 may be vulnerable due to backward compatibility efforts, and the company recommends that IT administrators patch 7.x-generation Windows Media Players as well.
Although the vulnerability could affect users of Windows XP, Microsoft says the issue is addressed by the Windows XP Critical Update that Redmond posted the day of the Windows XP launch (Oct. 25).
The vulnerability stems from an unchecked buffer in the code that processes Advanced Streaming Format (ASF).
An attacker would have to create a specially malformed ASF file and induce a user to play it. In some cases, the buffer overrun will merely cause Windows Media Player to crash. In other cases, the attacker could cause code to be executed on the machine with the user's privileges.
A mitigating factor is that the attacker must correctly guess the specific operating system the user is running for the attack to successfully execute any code on a user's machine.
The patch, the 56th this year, follows a recent and welcome trend out of Redmond in that it eliminates all known vulnerabilities affecting Windows Media Player 6.4.
Under Microsoft's new rating system, the risk is rated as critical over the Internet, intranet and for client systems.
The security bulletin about the vulnerability and link to the patch can be found at http://www.microsoft.com/technet/security/bulletin/ms01-056.asp.
Scott Bekker is editor in chief of Redmond Channel Partner magazine.