31th Jul 2002 [SBWID-5585]
COMMAND
mplay32.exe buffer overflow
SYSTEMS AFFECTED
mplay32.exe included in any Windows prior to XP SP1
PROBLEM
'ken'@FTU [ken_at_ftu@yahoo.com] reported following:
Microsoft is aware of the vulnerability.
Since this successful remote exploitation of this vulnerability depends
on other mitigating factors, Microsoft believes it is not worthy of a
bulletin. This overflow will be fixed in XP service pack 1.
I will explain my understanding of the vulnerability. Perhaps someone
can discover another way to exploit this executable without the other
mitigating factors...
mplay32.exe -- found in system32 directory -- suffers from a buffer
overflow. If the exe is called with a file name equal to or longer than
279 characters, EIP is overwritten.
Exploit
=======
Open a command prompt.
mplay32.exe A<x279>.mp3
Note: This is a unicode overflow. EIP now equals 0x00410041.
The executable runs in the user context. Privilege escalation is not an
issue. Count out the possibility of a local vulnerability.
Can this be executed remotely? With certain mitigating factors.
On an unpatched IIS server we can call
/scripts/..%255c..%255cwinnt/system32.exe?/A<x279>.mp3
and set EIP to 0x00410041. (I'm not giving further details of what to
do next, but the information is available on the internet.)
I tried to load mplay32.exe with the <object> tags but could not get
it to parse the file extension. Perhaps others will have better luck.
:)
I leave everyone with the exciting possibility that there is potential
for this to be remotely exploitable. Good luck.
SOLUTION
Editor's suggestion of the day: remove mplay32.exe... your computer is
a working tool, isn't it ?
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH