First published: Wed Jun 10 2015(Updated: )
Microsoft Windows Media Player 10 through 12 allows remote attackers to execute arbitrary code via a crafted DataObject on a web site, aka "Windows Media Player RCE via DataObject Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Media Player | =10 | |
Microsoft Windows Media Player | =10.00.00.3646 | |
Microsoft Windows Media Player | =10.00.00.3990 | |
Microsoft Windows Media Player | =10.00.00.4019 | |
Microsoft Windows Media Player | =10.00.00.4036 | |
Microsoft Windows Media Player | =11 | |
Microsoft Windows Media Player | =11.0.5721.5145 | |
Microsoft Windows Media Player | =11.0.5721.5230 | |
Microsoft Windows Media Player | =11.0.6000.6324 | |
Microsoft Windows Media Player | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1728 has a severity rating of critical due to its potential for remote code execution.
To mitigate CVE-2015-1728, update Microsoft Windows Media Player to the latest version available.
CVE-2015-1728 affects Windows Media Player versions 10, 11, and 12.
CVE-2015-1728 is a remote code execution vulnerability that can be exploited through a crafted DataObject.
CVE-2015-1728 can be exploited via a malicious website that presents a crafted DataObject.