Executive Summary
Summary | |
---|---|
Title | Microsoft Windows Win32 API fails to properly validate function parameters |
Informations | |||
---|---|---|---|
Name | VU#457281 | First vendor Publication | 2007-06-12 |
Vendor | VU-CERT | Last vendor Modification | 2007-06-12 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#457281Microsoft Windows Win32 API fails to properly validate function parametersOverviewThe Microsoft Windows Win32 API fails to properly validate function parameters, which could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.I. DescriptionThe Microsoft Windows Win32 API is a set of application programming interfaces for the Microsoft Windows operating system. The Win32 API allows applications to interact with the Windows operating system. The Microsoft Windows Win32 API fails to properly validate function parameters.II. ImpactBy convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with elevated privileges. Any application that uses the Win32 API, such as Internet Explorer or Outlook Express, may be vulnerable.III. SolutionApply an updateThis update is addressed by Microsoft Security Bulletin MS07-035.
Systems Affected
References
This vulnerability was reported by Microsoft, who in turn credit Billy Rios of VeriSign. This document was written by Will Dormann.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/457281 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1643 | |||
Oval ID: | oval:org.mitre.oval:def:1643 | ||
Title: | Win32 API Remote Code Execution Vulnerability | ||
Description: | Unspecified vulnerability in the Win32 API on Microsoft Windows 2000, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via certain parameters to an unspecified function. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-2219 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
35341 | Microsoft Windows Win32 API Unspecified Remote Code Execution |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows API res buffer overflow attempt RuleID : 11838 - Revision : 16 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-06-12 | Name : Arbitrary code can be executed on the remote host through the Win32 API. File : smb_nt_ms07-035.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-05-08 13:28:03 |
|