![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800328 |
Categoría: | Denial of Service |
Título: | Integer Overflow vulnerability in Microsoft Windows Media Player |
Resumen: | Windows Media Player is prone to an integer overflow vulnerability. |
Descripción: | Summary: Windows Media Player is prone to an integer overflow vulnerability. Vulnerability Insight: The issue is due to improper loading of WAV, SND or MID files on the affected application. Vulnerability Impact: Successful exploitation will allow attackers to execute arbitrary codes and cause application crash. Affected Software/OS: Microsoft, Windows Media Player version 9.x, 10.x, and 11.x Solution: Upgrade to Windows server 2003 SP2, or later versions of windows, which fixes this issue. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5745 BugTraq ID: 33018 http://www.securityfocus.com/bid/33018 Bugtraq: 20081224 MS Windows Media Player * (.WAV) Remote Integrer Overflow (Google Search) http://www.securityfocus.com/archive/1/499579/100/0/threaded https://www.exploit-db.com/exploits/7585 http://www.securitytracker.com/id?1021495 http://securityreason.com/securityalert/4823 XForce ISS Database: win-mediaplayer-wav-snd-mid-dos(47664) https://exchange.xforce.ibmcloud.com/vulnerabilities/47664 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |