Executive Summary

Summary
Title Internet Explorer VBScript Windows Help arbitrary code execution
Informations
Name VU#612021 First vendor Publication 2010-03-01
Vendor VU-CERT Last vendor Modification 2010-04-28
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.6 Attack Range Network
Cvss Impact Score 10 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#612021

Internet Explorer VBScript Windows Help arbitrary code execution

Overview

Microsoft Internet Explorer is vulnerable to arbitrary code execution through the use of VBScript and Windows Help.

I. Description

Microsoft Internet Explorer supports the use of VBScript, in addition to the more widely-used JavaScript scripting language. Several VBScript commands allow a "HelpFile" parameter to be specified, such as the MsgBox function. This parameter may point to a file on the local filesystem, or it may refer to a file that is hosted remotely via Windows file sharing. When the F1 key is pressed, Internet Explorer will launch Windows Help (winhlp32.exe) to display the specified context-sensitive help file. Because Windows Help .HLP files are unsafe files, this behavior can result in arbitrary code execution.

Exploit code for this vulnerability is publicly available.

II. Impact

By convincing a victim to view an HTML document (web page, HTML email, or email attachment) with Internet Explorer and to press the F1 key, an attacker could run arbitrary code with the privileges of the user running the application.

III. Solution

Apply an update

This issue is addressed in Microsoft Security Bulletin MS10-022.

Block outbound SMB traffic

This and other vulnerabilities may be mitigated by blocking outbound SMB traffic from your network to the internet. This can limit the ability to link to a remotely-hosted .HLP file using VBScript.

Do not press F1 while using Internet Explorer

The exploit code for this vulnerability requires the user to press F1 to trigger the context-sensitive help. If F1 is not pressed, then the code is not executed.

Systems Affected

VendorStatusDate NotifiedDate Updated
Microsoft CorporationVulnerable2010-04-28

References


http://www.microsoft.com/technet/security/bulletin/MS10-022.mspx
http://www.microsoft.com/technet/security/advisory/981169.mspx
http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx
http://isec.pl/vulnerabilities10.html
http://msdn.microsoft.com/en-us/library/sfw6660x%28VS.85%29.aspx
http://support.microsoft.com/kb/291369

Credit

This vulnerability was publicly disclosed by iSEC SEcurity Research.

This document was written by Will Dormann.

Other Information

Date Public:2010-02-26
Date First Published:2010-03-01
Date Last Updated:2010-04-28
CERT Advisory: 
CVE-ID(s):CVE-2010-0483
NVD-ID(s):CVE-2010-0483
US-CERT Technical Alerts: 
Metric:6.08
Document Revision:11

Original Source

Url : http://www.kb.cert.org/vuls/id/612021

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:7170
 
Oval ID: oval:org.mitre.oval:def:7170
Title: VBScript Help Keypress Vulnerability
Description: vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-0483
Version: 12
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s): VBScript 5.1
VBScript 5.6
VBScript 5.7
VBScript 5.8
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8654
 
Oval ID: oval:org.mitre.oval:def:8654
Title: Remote Code Execution vulnerability in VBScript
Description: vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-0483
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 2
Os 1
Os 3

OpenVAS Exploits

Date Description
2010-04-14 Name : Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
File : nvt/secpod_ms10-022.nasl
2010-03-10 Name : MS Internet Explorer 'VBScript' Remote Code Execution Vulnerability
File : nvt/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
62632 Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execu...

Windows contains a flaw that may allow a context-dependent attacker to execute arbitrary code. The issue is triggered when a user is convinced to press F1 in response to a MessageBox originated from VBscript within a web page.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Internet Explorer MsgBox arbitrary code execution attempt
RuleID : 19204 - Revision : 11 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer MsgBox arbitrary code execution attempt
RuleID : 19203 - Revision : 11 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer .hlp samba share download attempt
RuleID : 16452 - Revision : 13 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2010-04-13 Name : Arbitrary code can be executed on the remote host through the installed VBScr...
File : smb_nt_ms10-022.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2015-04-10 13:28:16
  • Multiple Updates
2013-05-11 00:57:14
  • Multiple Updates