Exploit Microsoft Windows Media Player 7 - Embedded OCX Control

Exploiter

Хакер
34,599
0
18 Дек 2022
EDB-ID
20240
Проверка EDB
  1. Пройдено
Автор
USSR LABS
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2000-0929
Дата публикации
2000-09-26
Код:
source: https://www.securityfocus.com/bid/1714/info

Due to a flaw in the method Microsoft Windows Media Player 7 handles OCX controls (ActiveX containers) in embedded in RTF email messages, it is possible to crash RTF-enabled email clients such as Microsoft Outlook and Outlook Express. While this vulnerability lies in the OCX control implementation in Windows Media Player 7, it only affects RTF-enabled email clients.

If a user of Outlook or Outlook Express were to receive an RTF email containing an embedded OCX control associated with Windows Media Player 7, the client would fail when the message was closed. Restarting the application would be required in order to regain normal functionality. In addition, deleting the offending email would resume normal operations of the email client. The functionality of Windows Media Player 7 would not be affected in any way. 

Binary - 20240-1.exe
Source - 20240-2.zip 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20240-1.exe

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20240-2.zip
 
Источник
www.exploit-db.com

Похожие темы