TUCoPS :: Windows Apps :: bt-21913.htm

Windows Media Player Plugin: Local File Detection Vulnerability
Windows Media Player Plugin: Local File Detection Vulnerability
Windows Media Player Plugin: Local File Detection Vulnerability



*** Windows Media Player Plugin: Local File Detection Vulnerability ***

A design flaw in Windows Media Player 11 allows a remote attacker to determine the presence of local files (programs, documents, etc.). I sent an e-mail to Microsoft (nearly a year ago) but they never responded=85

Windows Media Player permits to open locally stored media-files. Opening non-supported files usually provokes an error message. By a simple HTTP-redirect, the error message can be circumvented. Local files can be opened. The file-opening-procedure can be controlled with the =93Player.OpenStateChange Event=94. If a file exists, event 8 (=94MediaChanging=94) is fired. This way, via JavaScript, a malicious web site could determine the presence of local (and remote) files.

Additional infos (in German): www.lrv.ch.vu 

I=92ve also set up a demo page at: http://lrv.bplaced.net/wmp/wmp.php 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH