CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
98.4%
The remote host is running Windows Media Player 11.
There is a vulnerability in the remote version of this software that could allow an attacker to execute arbitrary code on the remote host.
To exploit this flaw, the attacker would need to set up a rogue audio file and send it to a victim on the remote host.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(34122);
script_version("1.31");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/08/05");
script_cve_id("CVE-2008-2253");
script_bugtraq_id(30550);
script_xref(name:"MSFT", value:"MS08-054");
script_xref(name:"MSKB", value:"954154");
script_xref(name:"IAVA", value:"2008-A-0064-S");
script_name(english:"MS08-054: Vulnerability in Windows Media Player Could Allow Remote Code Execution (954154)");
script_summary(english:"Checks the version of Media Player");
script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through the Media
Player.");
script_set_attribute(attribute:"description", value:
"The remote host is running Windows Media Player 11.
There is a vulnerability in the remote version of this software that
could allow an attacker to execute arbitrary code on the remote host.
To exploit this flaw, the attacker would need to set up a rogue audio
file and send it to a victim on the remote host.");
# https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-054
script_set_attribute(attribute:"see_also", value:"https://www.nessus.org/u?e000018e");
script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows Media Player 11.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2008-2253");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(94);
script_set_attribute(attribute:"vuln_publication_date", value:"2008/09/09");
script_set_attribute(attribute:"patch_publication_date", value:"2008/09/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2008/09/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
script_set_attribute(attribute:"stig_severity", value:"II");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2008-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Windows : Microsoft Bulletins");
script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
script_require_keys("SMB/MS_Bulletin_Checks/Possible");
script_require_ports(139, 445, 'Host/patch_management_checks');
exit(0);
}
include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");
get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
bulletin = 'MS08-054';
kb = '954154';
kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
if (hotfix_check_sp_range(xp:'2,3', vista:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
version = get_kb_item("SMB/WindowsMediaPlayer");
if (!version) audit(AUDIT_NOT_INST, "Windows Media Player");
rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");
share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
if (
hotfix_is_vulnerable(os:"6.0", file:"Wmpeffects.dll", version:"11.0.6000.6347", min_version:"11.0.6000.0", dir:"\system32", bulletin:bulletin, kb:kb) ||
hotfix_is_vulnerable(os:"6.0", file:"Wmpeffects.dll", version:"11.0.6000.6506", min_version:"11.0.6000.6500", dir:"\system32", bulletin:bulletin, kb:kb) ||
hotfix_is_vulnerable(os:"6.0", file:"Wmpeffects.dll", version:"11.0.6001.7002", min_version:"11.0.6001.0", dir:"\system32", bulletin:bulletin, kb:kb) ||
hotfix_is_vulnerable(os:"6.0", file:"Wmpeffects.dll", version:"11.0.6001.7106", min_version:"11.0.6001.7100", dir:"\system32", bulletin:bulletin, kb:kb) ||
hotfix_is_vulnerable(os:"5.1", file:"Wmpeffects.dll", version:"11.0.5721.5252", min_version:"11.0.0.0", dir:"\system32", bulletin:bulletin, kb:kb)
)
{
set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
hotfix_security_hole();
hotfix_check_fversion_end();
exit(0);
}
else
{
hotfix_check_fversion_end();
audit(AUDIT_HOST_NOT, 'affected');
}