Microsoft contains a buffer overflow in the Local Troubleshooter ActiveX control (Tshoot.ocx)

2003-10-16T00:00:00
ID VU:989932
Type cert
Reporter CERT
Modified 2003-10-16T18:27:00

Description

Overview

Microsoft Windows ships with a troubleshooting application to assist users with problems. A vulnerability in this application may permit a remote attacker to execute arbitrary code with the privileges of the current user.

Description

Microsoft Windows 2000 ships with an ActiveX control (Tshoot.ocx) that is a troubleshooting application to assist users with various system problems. A buffer overflow vulnerability exists in this control that may permit a remote attacker to execute arbitrary code with the privileges of the current user. Since this control is marked Safe for Scripting, a remote attacker who could trick the victim into viewing a crafted HTML web site, or HTML-based email message may be able to exploit this vulnerability.

It should be noted that the Microsoft Local Troubleshooter ActiveX control is installed as a default part of the operating system on Windows 2000.


Impact

Exploitation of this vulnerability could lead to the arbitrary execution of code with the privileges of the current user.


Solution

Microsoft has released patches in MS03-042 and Knowledgebase Article 826232 to address this issue. Apply the patches as appropriate.

According to the Microsoft Advisory, Microsoft Windows 2000 with Service Pack 2, Service Pack 3 or Service Pack 4 are vulnerable to this issue. Windows NT 4.0, NT Server 4.0, Terminal Server Edition , Windows XP, Windows Millennium Edition and Windows Server 2003 are not affected by this issue.


Vendor Information

989932

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Vendor has issued information

__ Sort by: Status Alphabetical

Expand all

Affected Unknown __ Unaffected

Javascript is disabled. Click here to view vendors.

__ Microsoft Corporation

Updated: October 16, 2003

Status

__ Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see, <http://www.microsoft.com/technet/security/bulletin/MS03-042.asp>.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A

References

  • <http://www.microsoft.com/technet/security/bulletin/MS03-042.asp>
  • <http://support.microsoft.com/?kbid=826232>

Acknowledgements

This vulnerability was reported in a Microsoft Security Bulletin.

This document was written by Jason A Rafail and is based on MS03-042.

Other Information

CVE IDs: | CVE-2003-0661
---|---
Severity Metric:** | 25.31
Date Public:
| 2003-10-15
Date First Published: | 2003-10-16
Date Last Updated: | 2003-10-16 18:27 UTC
Document Revision: | 7