Check Point Reference: | CPAI-2012-834 |
Date Published: | 9 Apr 2013 |
Severity: | Medium |
Last Updated: | Wednesday 08 January, 2025 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Ori Rejwan UMPlayer 0.98 and prior |
Vulnerability Description | A code execution vulnerability has been identified in Ori Rejwan UMPlayer. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to open a media file from a directory, which also contains a malicious DLL. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Media Player Enforcement Violation
Attack Information: UMPlayer wintab32.dll Insecure Library Loading