The vulnerability in Media Player 9 and 10 will let a malicious .asx-formatted playlist, if opened by an unsuspecting user, completely compromise the machine.
Proof-of-concept code that exploits a critical bug in Windows Media Player has gone public, Microsoft Corp. warned users late Thursday.
A vulnerability in Media Player 9 and 10 can be used by attackers to grab control of a PC, security researchers warned. A malicious .asx-formatted playlist, if opened by an unsuspecting user, could completely compromise the machine.
"We're aware of proof-of-concept code published publicly affecting Windows Media ASX file format [and] we are currently investigating," wrote Alexandra Huft, a security program manager with the Microsoft Security Response Center, on the team's blog. "We are not currently aware of attempts to exploit this vulnerability," she added.
Because .asx playlists open automatically within a browser, hackers would only need to coax users to a malicious Web site to snatch their systems. Microsoft has offered no workarounds or other tactical advice.
FrSIRT, which labeled the vulnerability as "critical," advised Windows XP users to upgrade to Media Player 11, disable the .asx format, or change settings so that playlists don't automatically open within Internet Explorer.
Microsoft plans to release six security updates Tuesday, Dec. 12, five of which will involve Windows. In its usual early notification, however, the Redmond, Wash. developer did not say whether the Media Player bug would be fixed this month.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.