A new vulnerability in Windows Media Player could enable an attacker to execute code on the machine of a user who downloads a skin for the player.
When users download skins, or interfaces, for WMP, the files are automatically saved to the players Skins folder. As protection against some attacks, WMP puts a random element into the file name so attackers cant guess the exact name of downloaded skins. However, its possible to skirt the measure by inserting a character into the skins URL. The vulnerability affects WMP 7.0 and WMP for XP. The patch for the flaw is at Microsofts Web site.
Also last week, a researcher found a flaw in Microsofts .Net Passport authentication system that could have let attackers reset the password to any account. Microsoft officials temporarily blocked access to the mechanism that allows users to reset their passwords via e-mail. The service was due to be fully restored late last week.