TITLE:
Microsoft Windows Explorer Web View Script Insertion 
Vulnerability

SECUNIA ADVISORY ID:
SA15017

VERIFY ADVISORY:
http://secunia.com/advisories/15017/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
Microsoft Windows 2000 Server
http://secunia.com/product/20/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/

DESCRIPTION:
GreyMagic has discovered a vulnerability in Windows, which can 
be
exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an input validation error in 
the
Web View library "webvw.dll" where certain metadata for files 
isn't
properly sanitised before being used. This can be exploited to
execute arbitrary HTML and script code in a local context with
escalated privileges by e.g. tricking a user into selecting a
malicious word document with a specially crafted author name in
Windows Explorer.

Successful exploitation allows execution of arbitrary code.

The vulnerability has been confirmed on a fully patched 
Microsoft
Windows 2000 SP4 system.

SOLUTION:
Disable Web content in folders:
"Tools" -> "Folder Options..." -> "General" --> "Use Windows 
classic
folders"

Microsoft Windows XP is not affected.

ORIGINAL ADVISORY:
http://www.greymagic.com/security/advisories/gm015-ie/
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to