{"vuid":"VU#879920","idnumber":"879920","name":"Microsoft Windows Media Player ActiveX control allows execution of javascript in \"already open\" frames","keywords":["Microsoft","Windows Media Player","Internet Explorer","ActiveX","javascript"],"overview":"A vulnerability in the Windows Media Player may allow remote attackers to view the contents of local files on the victim's computer.","clean_desc":"Using the \"LaunchURL\" method of the Windows Media Player ActiveX control, a web page author may be able to circumvent the frame security features normally present in Internet Explorer. It appears that javascript executed via the \"LaunchURL\" method executes in the frame associated with the Media Player control. Portions of the document object model that would not normally be accessible to the javascript are accessible when executed in this context. This vulnerability has not been confirmed to exist or operate as described, but seems credible.","impact":"A victim who visits a web page may expose local files to an attacker who created the malicious web page. This vulnerability is also reported to allow attackers to execute arbitrary code on the victim's system, but this has not been confirmed.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Georgi Guninski discovered this vulnerability.","author":"This document was written by Cory F. Cohen.","public":["http://www.securityfocus.com/bid/2167","http://www.guninski.com/wmp7ie.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-01-11T02:00:18Z","publicdate":"2001-01-01T00:00:00Z","datefirstpublished":"2002-09-27T17:51:40Z","dateupdated":"2003-03-26T20:43:41Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"17","cam_attackeraccessrequired":"15","cam_scorecurrent":"7.65","cam_scorecurrentwidelyknown":"7.65","cam_scorecurrentwidelyknownexploited":"15.3","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.65,"vulnote":null}