New security flaw in Windows Media player

Users are being advised to disable a certain type of file in Microsoft Corp.’s Windows Media Player software following the discovery of a new security hole in the software.

The flaw, which affects Windows Media Player versions 9 and 10, could allow a malicious hacker to run unauthorized software on a victim’s PC or cause a denial of service attack, according to security company FrSIRT, which rated the problem critical in an advisory Thursday.

The flaw is due to a buffer overflow error that can occur when Windows Media Player is used to run “.asx” media files, according to a warning from eEye Digital Security.

Such files open automatically in a Web browser, meaning a hacker would need only to post an infected .asx file in a Web page and then try to lure users to visit the page, eEye Digital said. An infected file could also be sent via email, in which case users would need to be persuaded to open it.

Microsoft said an initial investigation revealed that the “proof of concept” code could allow an attacker to execute code on a user’s machine. It said it was unaware of any attempts to exploit the vulnerability, and it was unclear Friday morning if the proof of concept code it referred to was in the hands of hackers.

Users can protect against the vulnerability in Internet Explorer by preventing it from opening .asx files automatically. Turning off Active Scripting would also greatly reduce, but not eliminate, the risk, Microsoft said. FrSIRT also recommended that users upgrade to Windows Media Player 11, which it said is not affected.

Microsoft was still determining Friday whether it needed to issue an “out of cycle” security fix for the problem or patch it with its next monthly software update.

The flaw was originally reported on Nov. 22, when it was identified only as a denial-of-service issue.

Some discussion boards described the problem as a “zero-day exploit,” although it was unclear if that was the case. Zero-day exploits occur when exploit code is released on the same day that a flaw is uncovered, giving users no time to protect themselves.

It’s been another busy week for Microsoft’s security teams. On Tuesday the company warned of an unpatched vulnerability in Word that had been the subject of what it called “limited attacks.” And on Thursday it said it was readying several patches for Visual Studio and Windows that it plans to release next week.

The patches currently due for next week do not address the problems with Word and Windows Media Player.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now