Vulnerabilities > CVE-2005-1208 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
Vulnerable Configurations
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-026.NASL |
description | The remote host contains a version of the HTML Help ActiveX control that is vulnerable to a security flaw that could allow an attacker to execute arbitrary code on the remote host by constructing a malicious web page and entice a victim to visit this web page. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18482 |
published | 2005-06-14 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18482 |
title | MS05-026: Vulnerability in HTML Help Could Allow Remote Code Execution (896358) |
code |
|
Oval
accepted 2011-05-16T04:00:14.579-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Jeff Ito organization Secure Elements, Inc. name Dragos Prisaca organization Gideon Technologies, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer. family windows id oval:org.mitre.oval:def:1057 status accepted submitted 2005-06-20T12:00:00.000-04:00 title Windows XP HTML Help Remote Code Execution Vulnerability version 35 accepted 2011-05-16T04:02:53.337-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Jeff Ito organization Secure Elements, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer. family windows id oval:org.mitre.oval:def:381 status accepted submitted 2005-06-20T12:00:00.000-04:00 title Server 2003 HTML Help Remote Code Execution Vulnerability version 32 accepted 2011-05-16T04:03:02.244-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Jeff Ito organization Secure Elements, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer. family windows id oval:org.mitre.oval:def:463 status accepted submitted 2005-06-20T12:00:00.000-04:00 title Windows 2000 HTML Help Remote Code Execution Vulnerability version 33
References
- http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0062.html
- http://www.us-cert.gov/cas/techalerts/TA05-165A.html
- http://www.kb.cert.org/vuls/id/851869
- http://secunia.com/advisories/15683
- http://www.securityfocus.com/bid/13953
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A463
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A381
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1057
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-026