This vulnerability is related to a previously unreported zero-day exploit discovered in the Hacking Team leaked emails. Trend Micro researchers (Aaron Luo, Kenney Lu, and Ziv Chang) discovered the exploit and subsequently reported their findings to Microsoft.
Advisory: SB2015090803 - Remote code execution in Microsoft Windows Media Center
Vulnerable component: Windows Media Center
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-20 - Improper input validation
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper handling of Media Center link (.mcl) files. A remote attacker can create a specially crafted Media Center link (.mcl) file that references malicious code, trick the victim into opening it and execute arbitrary code with privileges of the current user.Successful exploitation of this vulnerability results in system compromise.
Note: the vulnerability was being actively exploited.
- Microsoft Windows Media Center - Command Execution (MS15-100) [Exploit-DB]
- Microsoft Windows Media Center - MCL Exploit (MS15-100) (Metasploit) [Exploit-DB]