Vulnerabilities > CVE-2007-3891 - Remote Code Execution vulnerability in Windows Vista Weather Gadget

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
microsoft
nessus

Summary

Unspecified vulnerability in Windows Vista Weather Gadgets in Windows Vista allows remote attackers to execute arbitrary code via crafted HTML attributes.

Vulnerable Configurations

Part Description Count
OS
Microsoft
2

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS07-048.NASL
descriptionThe remote version of Microsoft Windows is missing a critical security update that fixes several vulnerabilities in the Desktop Gadgets. An attacker may exploit these flaws to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to lure the user into adding a malicious RSS feed or mail contact or using a malicious weather link.
last seen2020-06-01
modified2020-06-02
plugin id25901
published2007-08-16
reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/25901
titleMS07-048: Vulnerabilities in Windows Gadgets Could Allow Remote Code Execution (938123)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(25901);
 script_version("1.30");
 script_cvs_date("Date: 2018/11/15 20:50:30");

 script_cve_id("CVE-2007-3032", "CVE-2007-3033", "CVE-2007-3891");
 script_bugtraq_id(25287, 25304, 25306);
 script_xref(name:"MSFT", value:"MS07-048");
 script_xref(name:"MSKB", value:"938123");
 
 script_xref(name:"CERT", value:"121024");
 script_xref(name:"CERT", value:"558648");
 script_xref(name:"CERT", value:"542808");

 script_name(english:"MS07-048: Vulnerabilities in Windows Gadgets Could Allow Remote Code Execution (938123)");
 script_summary(english:"Determines the presence of update 938123");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through Desktop
Gadgets.");
 script_set_attribute(attribute:"description", value:
"The remote version of Microsoft Windows is missing a critical security
update that fixes several vulnerabilities in the Desktop Gadgets.

An attacker may exploit these flaws to execute arbitrary code on the
remote host. To exploit this flaw, an attacker would need to lure the
user into adding a malicious RSS feed or mail contact or using a
malicious weather link.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2007/ms07-048");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows Vista.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(79);

 script_set_attribute(attribute:"vuln_publication_date", value:"2007/08/14");
 script_set_attribute(attribute:"patch_publication_date", value:"2007/08/14");
 script_set_attribute(attribute:"plugin_publication_date", value:"2007/08/16");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("smb_func.inc");


include("misc_func.inc");
get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS07-048';
kbs = make_list("938123");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);

if ( hotfix_check_sp(vista:1) <= 0 ) exit(0);


login	=  kb_smb_login();
pass  	=  kb_smb_password();
domain 	=  kb_smb_domain();
port    =  kb_smb_transport();


path = hotfix_get_programfilesdir();
if (!path) exit (1, "Failed to get the Program Files directory.");


dir =  ereg_replace(pattern:"^[A-Za-z]:(.*)", replace:"\1\Windows Sidebar\Gadgets\RSSFeeds.Gadget", string:path);
share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:path);

if(! smb_session_init()) audit(AUDIT_FN_FAIL, "smb_session_init");

r = NetUseAdd(login:login, password:pass, domain:domain, share:share);
if ( r != 1 )
{
  NetUseDel();
  audit(AUDIT_SHARE_FAIL,share);
}

retx  = FindFirstFile(pattern:dir + "\??-??");
if (isnull(retx) || strlen(retx[1]) != 5)
{
 NetUseDel();
 exit(0);
}

xml = dir + "\" + retx[1] + "\gadget.xml";

handle =  CreateFile (file:xml, desired_access:GENERIC_READ, file_attributes:FILE_ATTRIBUTE_NORMAL, share_mode:FILE_SHARE_READ, create_disposition:OPEN_EXISTING);

if ( ! isnull(handle) )
{
 data = ReadFile(handle:handle, offset:0, length:4096);
 CloseFile(handle:handle);

 if (egrep(pattern:'<version><!--_locComment_text="{Locked}"-->[0-9]+\\.[0-9]+\\.[0-9]+\\.[0-9]+</version>', string:data))
 {
  version = ereg_replace(pattern:'.*<version><!--_locComment_text="{Locked}"-->([0-9]+\\.[0-9]+\\.[0-9]+\\.[0-9]+)</version>.*', string:data, replace:"\1");
  v = split(version, sep:".", keep:FALSE);

  if ( !isnull(v) )
    if ( int(v[0]) == 1 &&  int(v[1]) < 1 ) {
 set_kb_item(name:"SMB/Missing/MS07-048", value:TRUE);
 info =
   '\n  Path : ' + share-'$' + xml +
   '\n  Detected version : ' + version +
   '\n  Fixed version : 1.1.0.0\n';

 hotfix_add_report(info, bulletin:bulletin, kb:'938123');
 hotfix_security_warning();
 }
 }
}

NetUseDel();

Oval

accepted2014-08-18T04:02:09.469-04:00
classvulnerability
contributors
  • nameAndrew Buttner
    organizationThe MITRE Corporation
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
definition_extensions
commentMicrosoft Windows Vista is installed
ovaloval:org.mitre.oval:def:228
descriptionUnspecified vulnerability in Windows Vista Weather Gadgets in Windows Vista allows remote attackers to execute arbitrary code via crafted HTML attributes.
familywindows
idoval:org.mitre.oval:def:2071
statusaccepted
submitted2007-09-06T09:46:06
titleVulnerability in Weather Gadget.
version25

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 25306,25304 CVE(CAN) ID: CVE-2007-3891,CVE-2007-3032 Vista是微软发布的最新的操作系统。 Vista侧栏的联系人和天气小工具在解析某些属性时没有执行充分的验证,远程攻击者可能利用此漏洞通过诱使用户执行某些操作来控制系统。 如果用户在联系人小工具中导入添加了恶意的联系人文件,或单击了天气小工具中的恶意链接,就可能导致在系统上运行恶意代码。 Microsoft Windows Vista 临时解决方法: * 卸载或禁用天气和联系人小工具 * 在“组策略”或注册表中禁用侧栏 * 修改gadget.xml上的访问控制列表以增加限制: 1. 依次单击“开始”、“所有程序”、“附件”,右键单击“命令提示符”,选择“以管理员身份运行”,然后单击“继续”。 2. 在命令提示符处键入以下命令: cd %ProgramFiles%\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US 3. 在命令提示符处键入以下命令。记下文件上的当前ACL(包括继承设置),以便将来撤消此修改时作为参考: takeown /f gadget.xml 4. 在命令提示符处键入以下命令以调用源标题小工具的ACL。 记下文件上的当前ACL(包括继承设置),以便将来撤消此修改时作为参考: cacls gadget.xml /deny Everyone:(R,RX) 5. 应用此临时解决方案后,必须注销系统或关闭sidebar.exe进程。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS07-048)以及相应补丁: MS07-048:Vulnerabilities in Windows Gadgets Could Allow Remote Code Execution (938123) 链接:<a href="http://www.microsoft.com/technet/security/Bulletin/MS07-048.mspx?pf=true" target="_blank">http://www.microsoft.com/technet/security/Bulletin/MS07-048.mspx?pf=true</a> 补丁下载: <a href="http://www.microsoft.com/downloads/details.aspx?displaylang=zh-cn&amp;FamilyID=49a5bd84-da71-4529-b4d3-ac57dab59e01" target="_blank">http://www.microsoft.com/downloads/details.aspx?displaylang=zh-cn&amp;FamilyID=49a5bd84-da71-4529-b4d3-ac57dab59e01</a> <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=24443f59-b908-480b-9b72-7094d4b5e128" target="_blank">http://www.microsoft.com/downloads/details.aspx?FamilyId=24443f59-b908-480b-9b72-7094d4b5e128</a>
idSSV:2126
last seen2017-11-19
modified2007-08-17
published2007-08-17
reporterRoot
titleMicrosoft Vista侧栏联系人及天气小工具远程代码执行漏洞(MS07-048)