Vulnerabilities > CVE-2004-0572 - Local Buffer Overrun vulnerability in Microsoft Windows Program Group Converter Filename

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
microsoft
critical
nessus

Summary

Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS04-037.NASL
descriptionThe remote version of Windows contains a flaw in the Windows Shell that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to lure a victim into visiting a malicious website or into opening a malicious file attachment.
last seen2020-06-01
modified2020-06-02
plugin id15460
published2004-10-12
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15460
titleMS04-037: Vulnerability in Windows Shell (841356)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(15460);
 script_version("1.37");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id("CVE-2004-0214", "CVE-2004-0572");
 script_bugtraq_id(10677);
 script_xref(name:"MSFT", value:"MS04-037");
 script_xref(name:"MSKB", value:"841356");

 script_name(english:"MS04-037: Vulnerability in Windows Shell (841356)");
 script_summary(english:"Determines if hotfix 841356 has been installed");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through the web
client.");
 script_set_attribute(attribute:"description", value:
"The remote version of Windows contains a flaw in the Windows Shell that
could allow an attacker to execute arbitrary code on the remote host.

To exploit this flaw, an attacker would need to lure a victim into
visiting a malicious website or into opening a malicious file
attachment.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2004/ms04-037");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Windows NT, 2000, XP and
2003.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2004/10/12");
 script_set_attribute(attribute:"patch_publication_date", value:"2004/10/12");
 script_set_attribute(attribute:"plugin_publication_date", value:"2004/10/12");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS04-037';
kb = '841356';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(nt:'6', win2k:'3,4', xp:'0,1', win2003:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  hotfix_is_vulnerable(os:"5.2", sp:0, file:"Shell32.dll", version:"6.0.3790.205", dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"5.1", sp:1, file:"Shell32.dll", version:"6.0.2800.1580", dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"5.1", sp:0, file:"Shell32.dll", version:"6.0.2750.166", dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"5.0", file:"Shell32.dll", version:"5.0.3900.6975", dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"4.0", file:"Shell32.dll", version:"4.72.3843.3100", dir:"\system32", bulletin:bulletin, kb:kb)
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

  • accepted2004-12-09T08:46:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:1279
    statusaccepted
    submitted2004-10-14T03:38:00.000-04:00
    titleWindows 98 Program Group Converter Buffer Overflow
    version2
  • accepted2011-05-16T04:01:55.499-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameDragos Prisaca
      organizationGideon Technologies, Inc.
    • nameDragos Prisaca
      organizationGideon Technologies, Inc.
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:1837
    statusaccepted
    submitted2004-10-14T03:39:00.000-04:00
    titleWindows XP (64-Bit) Program Group Converter Buffer Overflow in grpconv.exe
    version73
  • accepted2011-05-16T04:01:56.952-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:1843
    statusaccepted
    submitted2004-10-14T03:39:00.000-04:00
    titleWindows XP (32-Bit) Program Group Converter Buffer Overflow
    version70
  • accepted2004-12-09T08:46:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:2753
    statusaccepted
    submitted2004-10-14T03:39:00.000-04:00
    titleWindows 2000 Program Group Converter Buffer Overflow
    version64
  • accepted2008-03-24T04:00:26.547-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameJohn Hoyland
      organizationCentennial Software
    • nameJonathan Baker
      organizationThe MITRE Corporation
    definition_extensions
    commentMicrosoft Windows NT is installed
    ovaloval:org.mitre.oval:def:36
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:3071
    statusaccepted
    submitted2004-10-14T03:39:00.000-04:00
    titleWindows NT Program Group Converter Buffer Overflow
    version72
  • accepted2004-12-09T08:46:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:3768
    statusaccepted
    submitted2004-10-14T03:38:00.000-04:00
    titleWindows ME Program Group Converter Buffer Overflow
    version2
  • accepted2011-05-16T04:02:53.715-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameDragos Prisaca
      organizationGideon Technologies, Inc.
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:3822
    statusaccepted
    submitted2004-10-14T03:38:00.000-04:00
    titleWindows XP (64-Bit) Program Group Converter Buffer Overflow in shell32.dll
    version72
  • accepted2004-12-09T08:46:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:4244
    statusaccepted
    submitted2004-10-14T03:39:00.000-04:00
    titleWindows 2003 (32-Bit) Program Group Converter Buffer Overflow
    version64
  • accepted2009-12-21T04:00:31.880-05:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameDragos Prisaca
      organizationGideon Technologies, Inc.
    • nameDragos Prisaca
      organizationGideon Technologies, Inc.
    descriptionBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
    familywindows
    idoval:org.mitre.oval:def:4493
    statusaccepted
    submitted2004-10-14T03:39:00.000-04:00
    titleWindows 2003 (64-Bit) Program Group Converter Buffer Overflow
    version68