Windows Media Format Runtime vulnerability could allow remote code execution
Report ID: MS201307006
Date Published: 11 July 2013
Compromise Type: remote-code-execution
Compromise From: remote
Windows Media Format Runtime 9
Windows Media Format Runtime 9.5
Windows Media Format Runtime 9.5 x64
Windows Media Format Runtime 11
Windows Media Format Runtime 12
A vulnerability involving Windows Media Format Runtime could allow an attacker to execute code and take control of an affected system.
Microsoft has issued a security update to address a remote code execution vulnerability in Windows Media Format Runtime. It was caused by failure to parse specially crafted media files, and could be exploited into allowing an attacker to execute code and take control of a system.
This issue has been resolved in the update by modifying the way that Windows Media Player opens media files. Users are recommended to install the update to their system as a protection measure against possible exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-057)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.