Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.vupen.com/english/advisories/2006/0575 | vdb-entry x_refsource_VUPEN |
| http://www.securityfocus.com/bid/16644 | vdb-entry x_refsource_BID |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/24493 | vdb-entry x_refsource_XF |
| http://securitytracker.com/id?1015628 | vdb-entry x_refsource_SECTRACK |
| http://www.kb.cert.org/vuls/id/692060 | third-party-advisory x_refsource_CERT-VN |
| http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393 | third-party-advisory x_refsource_IDEFENSE |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-006 | vendor-advisory x_refsource_MS |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1559 | vdb-entry signature x_refsource_OVAL |
| http://www.us-cert.gov/cas/techalerts/TA06-045A.html | third-party-advisory x_refsource_CERT |
| http://secunia.com/advisories/18852 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|