CERTA-2004-AVI-241
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités présentes dans les fonctions d'aide de Windows permettent à un utilisateur distant mal intentionné d'exécuter du code arbitraire sur la machine vulnérable.
Description
Deux vulnérabilités permettent à un utilisateur distant mal intentionné, par le biais d'une adresse réticulaire (URL) d'aide malicieusement constuite, d'exécuter du code arbitraire sur la machine cible. Si l'utilisateur est connecté en tant qu'administrateur, il est possible pour l'attaquant d'avoir les mêmes droits.
Solution
Se référer au bulletin de sécurité Microsoft pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Microsoft Windows Server 2003 ; | ||
| Microsoft | Windows | Microsoft Windows Millennium Edition ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 64-Bit Edition ; | ||
| Microsoft | Windows | Microsoft Windows 98 et 98 SE ; | ||
| Microsoft | Windows | Microsoft Windows XP 64-Bit Edition Service Pack 1 ; | ||
| Microsoft | Windows | Internet Explorer 6.0 Service Pack 1 installé sur Windows NT 4.0 SP6a. | ||
| Microsoft | Windows | Microsoft Windows XP 64-Bit Edition Version 2003 ; | ||
| Microsoft | Windows | Microsoft Windows 2000 Service Pack 2, Service Pack 3 et Service Pack 4 ; | ||
| Microsoft | Windows | Microsoft Windows XP et XP Service Pack 1 ; |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Windows Server 2003 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Millennium Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 64-Bit Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 98 et 98 SE ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP 64-Bit Edition Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Internet Explorer 6.0 Service Pack 1 install\u00e9 sur Windows NT 4.0 SP6a.",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP 64-Bit Edition Version 2003 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 2000 Service Pack 2, Service Pack 3 et Service Pack 4 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP et XP Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur distant mal intentionn\u00e9,\npar le biais d\u0027une adresse r\u00e9ticulaire (URL) d\u0027aide malicieusement\nconstuite, d\u0027ex\u00e9cuter du code arbitraire sur la machine cible. Si\nl\u0027utilisateur est connect\u00e9 en tant qu\u0027administrateur, il est possible\npour l\u0027attaquant d\u0027avoir les m\u00eames droits.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Microsoft pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"links": [],
"reference": "CERTA-2004-AVI-241",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les fonctions d\u0027aide de Windows\npermettent \u00e0 un utilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code\narbitraire sur la machine vuln\u00e9rable.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans les fichiers d\u0027aide HTML de Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS04-023",
"url": "http://www.microsoft.com/technet/security/bulletin/ms04-023.mspx"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…