HTTP: Microsoft Windows Media Player Skin File Code Execution

This signature detects an HTTP server response that contains a malformed "Content-Disposition:" field. This response can cause a vulnerable Microsoft Internet Explorer client to download and execute an arbitrary file.

Extended Description

Windows Media Player is vulnerable to code execution through skin files. WMP does not properly validate URLs that are passed to initiate a skin file download and installation. This could allow a malicious file advertised as a skin file to be downloaded to a known location and executed through some other means.

Affected Products

Microsoft windows_media_player

Short Name
HTTP:STC:IE:WMP-SKIN-EXEC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2003-0228 Code Execution File Media Microsoft Player Skin Windows bid:7517
Release Date
01/29/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Microsoft

CVSS Score

7.5

Found a potential security threat?