Lucene search

K
certCERTVU:187196
HistoryJul 14, 2004 - 12:00 a.m.

Microsoft Windows fails to properly process showHelp URLs

2004-07-1400:00:00
www.kb.cert.org
11

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.443 Medium

EPSS

Percentile

97.3%

Overview

A vulnerability in the showHelp Method may allow a remote attacker to execute arbitrary code.

Description

A cross domain vulnerability exists in the showHelp method that may permit a remote attacker to execute local commands on the system with the privileges of the current user. Explotation of this vulnerability would require the user to visit a malicious website or otherwise visit a crafted URL and then take several interactive steps.

Note that Microsoft states that they have received reports that this vulnerability is being actively exploited.

For full details, please see the “showHelp Vulnerability - CAN-2003-1041” section of Microsoft Security Bulletin MS04-023.


Impact

A remote attacker may be able to execute local commands on the system with the privileges of the current user.


Solution

Microsoft has provided a patch in Microsoft Security Bulletin MS04-023.


Microsoft recommends several workarounds to help mitigate attack vectors. These include Strengthen the security settings for the Local Machine zone in Internet Explorer, unregistering HTML Help, and reading e-mail messages in plain-text format. Please see Microsoft Security Bulletin MS04-023 for full details and impacts of implementing these workarounds.


Vendor Information

187196

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: July 14, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Microsoft Security Bulletin MS04-023.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23187196 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.microsoft.com/technet/security/bulletin/ms04-023.mspx&gt;

Acknowledgements

Thanks to Microsoft for reporting this vulnerability.

This document was written by Jason A Rafail and is based on information from Microsoft Security Bulletin MS04-023.

Other Information

CVE IDs: CVE-2003-1041
Severity Metric: 25.52 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.443 Medium

EPSS

Percentile

97.3%