Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2014-03-31 |
Product | Windows Media Player | Last view | 2015-06-09 |
Version | 11.0.5721.5230 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:windows_media_player |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.3 | 2015-06-09 | CVE-2015-1728 | Microsoft Windows Media Player 10 through 12 allows remote attackers to execute arbitrary code via a crafted DataObject on a web site, aka "Windows Media Player RCE via DataObject Vulnerability." |
6.8 | 2014-03-31 | CVE-2014-2671 | Microsoft Windows Media Player (WMP) 11.0.5721.5230 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted WAV file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
50% (1) | CWE-17 | Code |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0124 | Microsoft Windows Media Player Remote Code Execution Vulnerability (MS15-057) Severity: Category II - VMSKEY: V0060951 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-07-08 | Microsoft Windows Media Player DataObject buffer overflow attempt RuleID : 34732 - Type : OS-WINDOWS - Revision : 2 |
2015-07-08 | Microsoft Windows Media Player DataObject buffer overflow attempt RuleID : 34731 - Type : OS-WINDOWS - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2015-06-09 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-057.nasl - Type: ACT_GATHER_INFO |