ID CVE-2005-0063
Summary The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
References
Vulnerable Configurations
  • Microsoft Windows 2000
    cpe:2.3:o:microsoft:windows_2000
  • Microsoft windows 2000_sp1
    cpe:2.3:o:microsoft:windows_2000:-:sp1
  • Microsoft windows 2000_sp2
    cpe:2.3:o:microsoft:windows_2000:-:sp2
  • Microsoft windows 2000_sp3
    cpe:2.3:o:microsoft:windows_2000:-:sp3
  • Microsoft Windows 2000 Service Pack 4
    cpe:2.3:o:microsoft:windows_2000:-:sp4
  • cpe:2.3:o:microsoft:windows_2003_server:enterprise:-:64-bit
    cpe:2.3:o:microsoft:windows_2003_server:enterprise:-:64-bit
  • cpe:2.3:o:microsoft:windows_2003_server:r2:-:64-bit
    cpe:2.3:o:microsoft:windows_2003_server:r2:-:64-bit
  • cpe:2.3:o:microsoft:windows_2003_server:standard:-:64-bit
    cpe:2.3:o:microsoft:windows_2003_server:standard:-:64-bit
  • cpe:2.3:o:microsoft:windows_2003_server:web
    cpe:2.3:o:microsoft:windows_2003_server:web
  • Microsoft windows 98_gold
    cpe:2.3:o:microsoft:windows_98:-:gold
  • Microsoft windows 98_se
    cpe:2.3:o:microsoft:windows_98se
  • Microsoft Windows ME
    cpe:2.3:o:microsoft:windows_me
  • cpe:2.3:o:microsoft:windows_xp:-:home
    cpe:2.3:o:microsoft:windows_xp:-:home
  • cpe:2.3:o:microsoft:windows_xp:-:media_center
    cpe:2.3:o:microsoft:windows_xp:-:media_center
  • Microsoft Windows XP Professional Gold
    cpe:2.3:o:microsoft:windows_xp:-:gold:professional
  • cpe:2.3:o:microsoft:windows_xp:-:sp1:64-bit
    cpe:2.3:o:microsoft:windows_xp:-:sp1:64-bit
  • Microsoft Windows XP Service Pack 1 Home Edition
    cpe:2.3:o:microsoft:windows_xp:-:sp1:home
  • Microsoft windows xp_sp1 media_center
    cpe:2.3:o:microsoft:windows_xp:-:sp1:media_center
  • Microsoft Windows XP Service Pack 2 Home Edition
    cpe:2.3:o:microsoft:windows_xp:-:sp2:home
  • Microsoft windows xp_sp2 media_center
    cpe:2.3:o:microsoft:windows_xp:-:sp2:media_center
  • Microsoft windows xp_sp2 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp2:tablet_pc
CVSS
Base: 7.5 (as of 02-11-2016 - 11:34)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description MS Windows (HTA) Script Execution Exploit (MS05-016). CVE-2005-0063. Local exploit for windows platform
id EDB-ID:938
last seen 2016-01-31
modified 2005-04-14
published 2005-04-14
reporter ZwelL
source https://www.exploit-db.com/download/938/
title Microsoft Windows - HTA Script Execution Exploit MS05-016
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS05-016.NASL
description The remote version of Windows contains a flaw in the Windows Shell that could allow an attacker to elevate his privileges and/or execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to lure a victim into visiting a malicious website or into opening a malicious file attachment.
last seen 2019-02-21
modified 2018-11-15
plugin id 18020
published 2005-04-12
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=18020
title MS05-016: Vulnerability in Windows Shell (893086)
oval via4
  • accepted 2011-05-16T04:02:24.596-04:00
    class vulnerability
    contributors
    • name Harvey Rubinovitz
      organization The MITRE Corporation
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
    family windows
    id oval:org.mitre.oval:def:2184
    status accepted
    submitted 2005-05-04T12:00:00.000-04:00
    title MSHTA Code Execution Vulnerability (64-bit XP,SP1)
    version 67
  • accepted 2011-05-16T04:02:46.707-04:00
    class vulnerability
    contributors
    • name Harvey Rubinovitz
      organization The MITRE Corporation
    • name John Hoyland
      organization Centennial Software
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
    family windows
    id oval:org.mitre.oval:def:3456
    status accepted
    submitted 2005-05-04T12:00:00.000-04:00
    title MSHTA Code Execution Vulnerability (32-bit XP,SP1)
    version 68
  • accepted 2007-02-20T13:40:29.778-05:00
    class vulnerability
    contributors
    • name Harvey Rubinovitz
      organization The MITRE Corporation
    • name John Hoyland
      organization Centennial Software
    description The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
    family windows
    id oval:org.mitre.oval:def:407
    status accepted
    submitted 2005-05-04T12:00:00.000-04:00
    title MSHTA Code Execution Vulnerability (32-bit Server 2003)
    version 64
  • accepted 2011-05-16T04:03:03.562-04:00
    class vulnerability
    contributors
    • name Harvey Rubinovitz
      organization The MITRE Corporation
    • name Andrew Buttner
      organization The MITRE Corporation
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
    family windows
    id oval:org.mitre.oval:def:4710
    status accepted
    submitted 2005-05-04T12:00:00.000-04:00
    title MSHTA Code Execution Vulnerability (Windows 2000)
    version 68
  • accepted 2011-05-16T04:03:12.926-04:00
    class vulnerability
    contributors
    • name Harvey Rubinovitz
      organization The MITRE Corporation
    • name Dragos Prisaca
      organization Gideon Technologies, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
    family windows
    id oval:org.mitre.oval:def:573
    status accepted
    submitted 2005-05-04T12:00:00.000-04:00
    title MSHTA Code Execution Vulnerability (32-bit XP,SP2)
    version 68
  • accepted 2007-02-20T13:40:47.817-05:00
    class vulnerability
    contributors
    • name Harvey Rubinovitz
      organization The MITRE Corporation
    • name John Hoyland
      organization Centennial Software
    description The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
    family windows
    id oval:org.mitre.oval:def:587
    status accepted
    submitted 2005-05-04T12:00:00.000-04:00
    title MSHTA Code Execution Vulnerability (64-bit Server 2003 and XP Version 2003)
    version 65
refmap via4
bid 13132
bugtraq 20050529 Spam exploiting MS05-016
idefense 20050412 Microsoft MSHTA Script Execution Vulnerability
misc http://www.securiteam.com/exploits/5YP0T0AFFW.html
ms MS05-016
vupen ADV-2005-0335
Last major update 17-10-2016 - 23:07
Published 02-05-2005 - 00:00
Last modified 30-04-2019 - 10:27
Back to Top