Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2016-0185

Опубликовано: 10 мая 2016
Источник: msrc
EPSS Высокий

Описание

Windows Media Center Remote Code Execution Vulnerability

A vulnerability exists in Windows Media Center that could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could take control of an affected system. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Workstations are primarily at risk of this vulnerability.

To exploit the vulnerability, user interaction is required. In a web-browsing scenario, a user would have to navigate to a compromised website that an attacker is using to host a malicious .mcl file. In an email attack scenario, an attacker would have to convince a user who is logged on to a vulnerable workstation to click a specially crafted link in an email.

The security update addresses the vulnerability by correcting how Windows Media Center handles certain resources in the .mcl file.

Обходное решение

Remove the MCL file association

To use the interactive method: Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys and Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe.

  1. Click Start, click Run, type regedit, and then click OK.
  2. Expand HKEY_CLASSES_ROOT, click .MCL, and then click the File menu and select Export.
  3. In the Export Registry File dialog box, type MCL HKCR file association registry backup.reg and click Save. This will create a backup of this registry key in the My Documents folder by default.
  4. Press the Delete key to delete the registry key. When prompted to delete the registry value, click Yes.
  5. Expand HKEY_CURRENT_USER, then Software, then Microsoft, then Windows, then CurrentVersion, then Explorer, and then FileExts.
  6. Click .MCL, and then click the File menu and select Export.
  7. In the Export Registry File dialog box, type MCL HKCU file association registry backup.reg and click Save. This will create a backup of this registry key in the My Documents folder by default.
  8. Press the Delete key to delete the registry key. When prompted to delete the registry value, click Yes.

To use the managed deployment script method:

  1. Make a backup copy of the registry keys from a managed deployment script using the following commands:
Regedit.exe /e MCL_HKCR_registry_backup.reg HKEY_CLASSES_ROOT\.MCL Regedit.exe /e MCL_HKCU_registry_backup.reg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MCL

  1. Save the following to a file with a .reg extension (for example, Delete_MCL_file_association.reg):
[-HKEY_CLASSES_ROOT\.MCL] [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ FileExts\.MCL]

  1. Run the registry script that you created in Step 2 on the target machine using the following command:

    Regedit.exe /s Delete_EXTENSION_file_association.reg

How to undo the workaround.

  1. Restore the registry key by using Regedit to restore the settings saved in the .REG file.

Обновления

ПродуктСтатьяОбновление
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

N/A

Older Software Release

Exploitation Less Likely

EPSS

Процентиль: 99%
0.82752
Высокий

Связанные уязвимости

CVSS3: 7.8
nvd
больше 9 лет назад

Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, and Windows 8.1 allows remote attackers to execute arbitrary code via a crafted Media Center link (aka .mcl) file, aka "Windows Media Center Remote Code Execution Vulnerability."

CVSS3: 7.8
github
больше 3 лет назад

Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, and Windows 8.1 allows remote attackers to execute arbitrary code via a crafted Media Center link (aka .mcl) file, aka "Windows Media Center Remote Code Execution Vulnerability."

fstec
больше 9 лет назад

Уязвимость операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.82752
Высокий