Check Point Advisories

Microsoft Windows Media Player RTSP Use after Free Code Execution (MS10-075; CVE-2010-3225)

Check Point Reference: CPAI-2010-289
Date Published: 12 Oct 2010
Severity: Critical
Last Updated: 13 Sep 2017
Source:
Industry Reference:CVE-2010-3225
Protection Provided by:

Security Gateway
R80, R77, R76, R75, R71, R70

Who is Vulnerable?
Vulnerability Description A remote code execution vulnerability has been reported in Microsoft Windows Media Player network sharing service. The Network Service account is a built-in account that has more access to resources and objects than members of the Users group. Services that run as the Network Service account access network resources by using the credentials of the computer account. A remote attacker may exploit this vulnerability execute arbitrary code remotely in the context of the current application.The vulnerability is due to the way Microsoft Windows Media Network Sharing Service processes Real Time Streaming Protocol (RTSP) packets. A remote attacker could exploit this vulnerability by creating a specially crafted RTSP packet and sending it to an affected system. Successful exploitation may allow the attacker to take complete control of an affected system.

Protection Overview

This protection will detect and block the overly large requests made to the vulnerable service.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update.For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R76 / R75 / R71 / R70

  1. In the IPS tab, click Protections and find the Microsoft Windows Media Player RTSP Use after Free Code Execution (MS10-075) protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

This protection's log will contain the following information:

Attack Name:  Media Player Enforcement Violation.
Attack Information:  Microsoft Windows Media Player RTSP Use after Free Code Execution (MS10-075)

This website uses cookies to ensure you get the best experience. More Info Got it, Thanks!