Executive Summary

Informations
Name MS05-026 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability in HTML Help Could Allow Remote Code Execution (896358)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1057
 
Oval ID: oval:org.mitre.oval:def:1057
Title: Windows XP HTML Help Remote Code Execution Vulnerability
Description: Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1208
Version: 8
Platform(s): Microsoft Windows XP
Product(s): HTML Help Facility
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:381
 
Oval ID: oval:org.mitre.oval:def:381
Title: Server 2003 HTML Help Remote Code Execution Vulnerability
Description: Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1208
Version: 5
Platform(s): Microsoft Windows Server 2003
Product(s): HTML Help Facility
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:463
 
Oval ID: oval:org.mitre.oval:def:463
Title: Windows 2000 HTML Help Remote Code Execution Vulnerability
Description: Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1208
Version: 7
Platform(s): Microsoft Windows 2000
Product(s): HTML Help Facility
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 21
Os 1
Os 14

Open Source Vulnerability Database (OSVDB)

Id Description
17305 Microsoft Windows HTML Help (CHM) File Overflow

A remote overflow exists in Microsoft Windows via the "ms-its" protocol specification. Microsoft Windows fails to check the size field resulting in a heap overflow. Specifying a very high value will cause a buffer overflow. With a specially crafted request, an attacker can cause Internet Explorer to open a malicious .CHM file and cause an excessive memory copy that overwrites portions of memory resulting in a loss of availability and possibly remote code execution.

Snort® IPS/IDS

Date Description
2014-01-10 HTML Help ActiveX CLSID unicode access
RuleID : 7441 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Windows HTML Help ActiveX object access
RuleID : 4183 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 CHM file transfer attempt
RuleID : 3821 - Revision : 10 - Type : WEB-CLIENT
2014-01-10 Microsoft Windows CHM file magic detected
RuleID : 3820 - Revision : 26 - Type : FILE-IDENTIFY
2014-01-10 Microsoft Windows CHM file magic detected
RuleID : 23757 - Revision : 13 - Type : FILE-IDENTIFY

Nessus® Vulnerability Scanner

Date Description
2005-06-14 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms05-026.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-02-17 11:45:11
  • Multiple Updates
2014-01-19 21:29:54
  • Multiple Updates
2013-05-11 12:21:42
  • Multiple Updates