MS04-034: Vulnerability in zipped folders may allow code execution (873376)

2004-10-12T00:00:00
ID SMB_NT_MS04-034.NASL
Type nessus
Reporter Tenable
Modified 2017-07-14T00:00:00

Description

The remote version of Windows is vulnerable to a bug in the way it handles compressed (zipped) folders, that could in turn be exploited by an attacker to execute arbitrary code on the remote host.

To exploit this flaw, an attacker would need to send a specially crafted .zip file to a victim on the remote host and wait for him to browse the file using the Windows Explorer.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(15459);
 script_version("$Revision: 1.29 $");
 script_cvs_date("$Date: 2017/07/14 17:23:02 $");

 script_cve_id("CVE-2004-0575");
 script_bugtraq_id(11382);
 script_osvdb_id(10695);
 script_xref(name:"CERT", value:"649374");
 script_xref(name:"MSFT", value:"MS04-034");
 script_xref(name:"MSKB", value:"873376");

 script_name(english:"MS04-034: Vulnerability in zipped folders may allow code execution (873376)");
 script_summary(english:"Determines if hotfix 873376 has been installed");

 script_set_attribute(attribute:"synopsis", value:"Arbitrary code can be executed on the remote host through Explorer.");
 script_set_attribute(attribute:"description", value:
"The remote version of Windows is vulnerable to a bug in the way it
handles compressed (zipped) folders, that could in turn be exploited by
an attacker to execute arbitrary code on the remote host.

To exploit this flaw, an attacker would need to send a specially crafted
.zip file to a victim on the remote host and wait for him to browse the
file using the Windows Explorer.");
 script_set_attribute(attribute:"see_also", value:"https://technet.microsoft.com/library/security/ms04-034");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows XP and 2003.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2004/10/12");
 script_set_attribute(attribute:"patch_publication_date", value:"2004/10/12");
 script_set_attribute(attribute:"plugin_publication_date", value:"2004/10/12");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2004-2017 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS04-034';
kb = '873376';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(xp:'0,1', win2003:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  hotfix_is_vulnerable(os:"5.2", sp:0, file:"Zipfldr.dll", version:"6.0.3790.198", dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"5.1", sp:1, file:"Zipfldr.dll", version:"6.0.2800.1584", dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"5.1", sp:0, file:"Zipfldr.dll", version:"6.0.2750.167", dir:"\system32", bulletin:bulletin, kb:kb)
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}