Lucene search

K
certCERTVU:240796
HistoryFeb 15, 2007 - 12:00 a.m.

Microsoft Windows Shell vulnerable to privilege escalation

2007-02-1500:00:00
www.kb.cert.org
7

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%

Overview

A vulnerability in Microsoft Windows Shell may allow an attacker to gain access with escalated privileges.

Description

The Microsoft Windows Shell Hardware Detection service provides notification for AutoPlay hardware events. This service fails to properly validate a function parameter in the way that hardware is detected and initialized which may allow access with escalated privileges. An attacker with the ability to run a specially crafted application that forces the system to perform a hardware detection and initialization event, may be able to exploit this vulnerability.


Impact

A local, authenticated attacker may be able to access the system with escalated privileges. Secondary impacts include: the ability to install programs; view, change or delete data; or create new accounts with full user rights.


Solution

Microsoft has released an update to address this issue. Please see Microsoft Security Bulletin MS07-006 for more details.


Workaround

Disable the Shell Hardware Detection service

Disabling the Shell Hardware Detection service will help protect the affected system from attempts to exploit this vulnerability. To disable the Shell Hardware Detection service, follow these steps:

1. Click Start, and then click Control Panel. Alternatively, point to Settings, and then click Control Panel.
2. Double-click Administrative Tools.
3. Double-click Services.
4. Double-click Shell Hardware Detection service.
5. In the Startup type list, click Disabled.
6. Click Stop, and then click OK.

Please note that disabling the Shell Hardware Detection service may limit Fast User switching capabilities.


Vendor Information

240796

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: February 15, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Microsoft Security Bulletin MS07-006 for further information.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23240796 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin MS07-006.

This document was written by Katie Steiner.

Other Information

CVE IDs: CVE-2007-0211
Severity Metric: 9.14 Date Public:

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%

Related for VU:240796