Lucene search

K
openvasCopyright (C) 2004 Jeff AdamsOPENVAS:136141256231011878
HistoryNov 03, 2005 - 12:00 a.m.

Buffer Overrun In HTML Converter Could Allow Code Execution (823559)

2005-11-0300:00:00
Copyright (C) 2004 Jeff Adams
plugins.openvas.org
17

6.3 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.156 Low

EPSS

Percentile

95.9%

There is a flaw in the way the HTML converter for Microsoft Windows handles a
conversion request during a cut-and-paste operation. This flaw causes a security vulnerability to exist.

# SPDX-FileCopyrightText: 2004 Jeff Adams
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.11878");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2003-0469");
  script_name("Buffer Overrun In HTML Converter Could Allow Code Execution (823559)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2004 Jeff Adams");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("secpod_reg_enum.nasl");
  script_mandatory_keys("SMB/registry_enumerated");

  script_tag(name:"summary", value:"There is a flaw in the way the HTML converter for Microsoft Windows handles a
  conversion request during a cut-and-paste operation. This flaw causes a security vulnerability to exist.");

  script_tag(name:"impact", value:"A specially crafted request to the HTML converter could cause the converter
  to fail in such a way that it could execute code in the context of the currently logged-in user. Because this
  functionality is used by Internet Explorer, an attacker could craft a specially formed Web page or HTML e-mail
  that would cause the HTML converter to run arbitrary code on a user's system. A user visiting an attacker's Web
  site could allow the attacker to exploit the vulnerability without any other user action.");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");

  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-023");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/8016");

  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("secpod_reg.inc");

if ( hotfix_check_sp(win2k:5, xp:2, win2003:1) <= 0 ) exit(0);
if ( hotfix_missing(name:"KB823559") > 0 )
  security_message(port:0);

6.3 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.156 Low

EPSS

Percentile

95.9%

Related for OPENVAS:136141256231011878