Vulnerability Name:

CVE-2006-6134 (CCN-30586)

Assigned:2006-11-22
Published:2006-11-22
Updated:2018-10-17
Summary:Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Wed Nov 22 2006 - 03:08:04 CST
Windows Media ASX PlayList File Denial Of Service Vulnerability

Source: CONFIRM
Type: UNKNOWN
http://blogs.technet.com/msrc/archive/2006/12/07/public-proof-of-concept-code-for-asx-file-format-isssue.aspx

Source: MITRE
Type: CNA
CVE-2006-6134

Source: CCN
Type: EEYEZD-20061122
ASX Playlist

Source: MISC
Type: UNKNOWN
http://research.eeye.com/html/alerts/zeroday/20061122.html

Source: CCN
Type: SA22971
Windows Media Player ASX/ASF File Parsing Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
22971

Source: SREASON
Type: UNKNOWN
1922

Source: CCN
Type: SECTRACK ID: 1017354
Windows Media Player ASX Playlist File Buffer Overflow May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1017354

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-274.htm

Source: CCN
Type: ASA-2006-274
MS06-078 Vulnerability in Windows Media Format Could Allow Remote Code Execution (923689)

Source: CCN
Type: IBM Internet Security Systems Protection Alert, Dec. 6, 2006
Windows Media Player ASX playlist buffer overflow

Source: CCN
Type: US-CERT VU#208769
Microsoft Windows Media Player fails to properly handle malformed Windows Media Metafiles

Source: CERT-VN
Type: US Government Resource
VU#208769

Source: CCN
Type: Microsoft Security Bulletin MS06-078
Vulnerability in Windows Media Player Could Allow Remote Code Execution (923689)

Source: CCN
Type: Microsoft Security Bulletin MS07-068
Vulnerability in Windows Media File Format Could Allow Remote Code Execution (941569 and 944275)

Source: BUGTRAQ
Type: UNKNOWN
20061122 Windows Media ASX PlayList File Denial Of Service Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20061205 eEye's Zero-Day Tracker Launch

Source: HP
Type: UNKNOWN
SSRT061288

Source: BID
Type: Exploit
21247

Source: CCN
Type: BID-21247
Windows Media Player ASX PlayList File Heap Overflow Vulnerability

Source: CERT
Type: US Government Resource
TA06-346A

Source: VUPEN
Type: Vendor Advisory
ADV-2006-4882

Source: MS
Type: UNKNOWN
MS06-078

Source: XF
Type: UNKNOWN
windowsmedia-asxplaylist-bo(30586)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:669

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:windows_media_player:10.00.00.4036:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:windows_media_format_runtime:9.5::x64:*:*:*:*:*
  • OR cpe:/a:microsoft:windows_media_format_runtime:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:windows_media_format_runtime:9:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:windows_media_format_runtime:9.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:669
    V
    Windows Media Format ASX Parsing Vulnerability
    2015-08-10
    BACK
    microsoft windows media player 10.00.00.4036
    microsoft windows media format runtime 9.5
    microsoft windows media format runtime 7.1
    microsoft windows media format runtime 9
    microsoft windows media format runtime 9.5