Lucene search

K
certCERTVU:616200
HistoryNov 23, 2004 - 12:00 a.m.

Microsoft Windows Shell contains a buffer overflow

2004-11-2300:00:00
www.kb.cert.org
10

0.963 High

EPSS

Percentile

99.5%

Overview

A remotely exploitable buffer overflow vulnerability exists in the Microsoft Windows Shell.

Description

The Microsoft Windows Shell provides the basic human-computer interface for Windows systems. Microsoft describes the Shell as follows:

The Windows Shell is responsible for providing the basic framework of the Windows user interface experience. It is most familiar to users as the Windows Desktop, but also provides a variety of other functions to help define the user’s computing session, including organizing files and folders, and providing the means to start applications.

A buffer overflow exists in the process the Windows Shell uses to launch applications. If an attacker can persuade a user to visit a specially crafted web page the attacker may be able to execute arbitrary code with the privileges of the current user. For more detailed information and for a list of vulnerable software, see Microsoft Security Bulletin MS04-037.

Please also note that this advisory replaces MS04-024 for Microsoft Windows NT 4.0, 2000, XP, and Server 2003.


Impact

If a remote attacker can persuade a user to visit a specially crafted web page, the attacker may be able to execute arbitrary code on that user’s system, possibly with elevated privileges.


Solution

Apply Patch

Apply a patch as described in Microsoft Security Bulletin MS04-037. Please also note that Microsoft is actively deploying the patches for this vulnerability via Windows Update.


Vendor Information

616200

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: October 15, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

For more details regarding remediation of this issue please see Microsoft Security Bulletin MS04-037.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23616200 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Microsoft has published Microsoft Security Bulletin MS04-037 to address this vulnerability. Microsoft credits Yorick Koster of ITsec Security Services providing information regarding this vulnerability.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2004-0214
Severity Metric: 27.11 Date Public:

0.963 High

EPSS

Percentile

99.5%