SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Shell Vendors:   Microsoft
Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
SecurityTracker Alert ID:  1013689
SecurityTracker URL:  http://securitytracker.com/id/1013689
CVE Reference:   CVE-2005-0063   (Links to External Site)
Date:  Apr 12 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4 and prior, XP SP2 and prior, 2003, 98/Me
Description:   A vulnerability was reported in the Microsoft Windows Shell in the Microsoft HTML Application Host (MSHTA). A remote user can create HTML that, when loaded by the target user, will execute arbitrary scripting code in the Local Computer zone.

Arbitrary scripting code can be executed from a non-executable object.

A remote user can append scripting code to the end of a file and then supply a CLSID identifier for the MSHTA to cause the scripting code to be executed. If the file has a filename extension that does not have an associated handler, the flaw can be exploited.

On Windows XP SP2, the user warning dialog can be bypassed.

The vendor credits iDEFENSE with reporting this vulnerability.

The vendor was notified on November 2, 2004.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A7511A19-ADD5-4793-92AC-25E953CE405C

Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=51679BB1-A61B-47AC-A943-F9F306EF987B

Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium):

http://www.microsoft.com/downloads/details.aspx?FamilyId=D513C252-FF70-46E3-BD79-077A336A974D

Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium):

http://www.microsoft.com/downloads/details.aspx?FamilyId=32ADAB00-6ED3-4418-8539-7FA468AD5DBD

Microsoft Windows Server 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=F803F008-5EE8-4BBE-8136-BC21708D1025

Microsoft Windows Server 2003 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=32ADAB00-6ED3-4418-8539-7FA468AD5DBD

A restart is required.

Vendor URL:  www.microsoft.com/technet/security/Bulletin/MS05-016.mspx (Links to External Site)
Cause:   Access control error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC