Executive Summary

TitleVulnerability in Windows Media Player Could Allow Remote Code Execution (3033890)
NameMS15-057First vendor Publication2015-06-09
VendorMicrosoftLast vendor Modification2015-06-09
Severity (Vendor) CriticalRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


Severity Rating: Critical
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows Media Player opens specially crafted media content that is hosted on a malicious website. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-057

CWE : Common Weakness Enumeration

100 %CWE-17Code

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28910
Oval ID: oval:org.mitre.oval:def:28910
Title: Windows Media Player RCE via DataObject vulnerability - CVE-2015-1728 (MS15-057)
Description: Microsoft Windows Media Player 10 through 12 allows remote attackers to execute arbitrary code via a crafted DataObject on a web site, aka "Windows Media Player RCE via DataObject Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-1728
Version: 4
Platform(s): Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s): Windows Media Player
Definition Synopsis:

CPE : Common Platform Enumeration


Information Assurance Vulnerability Management (IAVM)

2015-06-11IAVM : 2015-A-0124 - Microsoft Windows Media Player Remote Code Execution Vulnerability (MS15-057)
Severity : Category II - VMSKEY : V0060951

Snort® IPS/IDS

2015-07-08Microsoft Windows Media Player DataObject buffer overflow attempt
RuleID : 34732 - Revision : 2 - Type : OS-WINDOWS
2015-07-08Microsoft Windows Media Player DataObject buffer overflow attempt
RuleID : 34731 - Revision : 2 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

2015-06-09Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_nt_ms15-057.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
2016-04-27 04:57:31
  • Multiple Updates
2015-10-18 17:26:34
  • Multiple Updates
2015-07-08 21:27:02
  • Multiple Updates
2015-06-10 21:30:43
  • Multiple Updates
2015-06-10 13:27:53
  • Multiple Updates
2015-06-10 09:30:11
  • Multiple Updates
2015-06-09 21:30:51
  • Multiple Updates
2015-06-09 21:17:21
  • First insertion