Vulnerabilities > CVE-2008-4268 - Resource Management Errors vulnerability in Microsoft Windows Server 2008 and Windows Vista

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The Windows Search component in Microsoft Windows Vista Gold and SP1 and Server 2008 does not properly free memory during a save operation for a Windows Search file, which allows remote attackers to execute arbitrary code via a crafted saved-search file, aka "Windows Saved Search Vulnerability."

Vulnerable Configurations

Part Description Count
OS
Microsoft
7

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS08-075
bulletin_url
date2008-12-09T00:00:00
impactRemote Code Execution
knowledgebase_id959349
knowledgebase_url
severityCritical
titleVulnerabilities in Windows Search Could Allow Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS08-075.NASL
descriptionThe remote version of Windows contains a version of the Windows Shell that contains a vulnerability in the way it handles saved seaches. An attacker might use this flaw to trick an administrator to execute a saved search and therefore execute arbitrary commands on his behalf.
last seen2020-06-01
modified2020-06-02
plugin id35074
published2008-12-10
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/35074
titleMS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(35074);
 script_version("1.29");
 script_cvs_date("Date: 2018/11/15 20:50:30");

 script_cve_id("CVE-2008-4268", "CVE-2008-4269");
 script_bugtraq_id(32651, 32652);
 script_xref(name:"MSFT", value:"MS08-075");
 script_xref(name:"MSKB", value:"958624");
 script_xref(name:"IAVB", value:"2008-B-0083");

 script_name(english:"MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349)");
 script_summary(english:"Determines the presence of update 959349");

 script_set_attribute(attribute:"synopsis", value:
"Vulnerabilities in the Windows Shell may allow an attacker to execute
privileged commands on the remote host.");
 script_set_attribute(attribute:"description", value:
"The remote version of Windows contains a version of the Windows Shell
that contains a vulnerability in the way it handles saved seaches.

An attacker might use this flaw to trick an administrator to execute a saved
search and therefore execute arbitrary commands on his behalf.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-075");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows Vista and 2008.");
 script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(399);

 script_set_attribute(attribute:"vuln_publication_date", value:"2008/12/09");
 script_set_attribute(attribute:"patch_publication_date", value:"2008/12/09");
 script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/10");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_set_attribute(attribute:"stig_severity", value:"II");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS08-075';
kb = '958624';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(vista:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  hotfix_is_vulnerable(os:"6.0", sp:0, file:"Explorer.exe", version:"6.0.6000.16771", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"6.0", sp:0, file:"Explorer.exe", version:"6.0.6000.20947", min_version:"6.0.6000.20000", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"6.0", sp:1, file:"Explorer.exe", version:"6.0.6001.18164", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"6.0", sp:1, file:"Explorer.exe", version:"6.0.6001.22298", min_version:"6.0.6001.22000", bulletin:bulletin, kb:kb)
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_warning();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

accepted2011-11-21T04:13:13.091-05:00
classvulnerability
contributors
  • nameJeff Ito
    organizationSecure Elements, Inc.
  • namePrashanth A.
    organizationSecPod Technologies
definition_extensions
  • commentMicrosoft Windows Vista (32-bit) is installed
    ovaloval:org.mitre.oval:def:1282
  • commentMicrosoft Windows Vista x64 Edition is installed
    ovaloval:org.mitre.oval:def:2041
  • commentMicrosoft Windows Server 2008 (32-bit) is installed
    ovaloval:org.mitre.oval:def:4870
  • commentMicrosoft Windows Server 2008 (64-bit) is installed
    ovaloval:org.mitre.oval:def:5356
  • commentMicrosoft Windows Vista (32-bit) Service Pack 1 is installed
    ovaloval:org.mitre.oval:def:4873
  • commentMicrosoft Windows Vista x64 Edition Service Pack 1 is installed
    ovaloval:org.mitre.oval:def:5254
  • commentMicrosoft Windows Server 2008 (ia-64) is installed
    ovaloval:org.mitre.oval:def:5667
descriptionThe Windows Search component in Microsoft Windows Vista Gold and SP1 and Server 2008 does not properly free memory during a save operation for a Windows Search file, which allows remote attackers to execute arbitrary code via a crafted saved-search file, aka "Windows Saved Search Vulnerability."
familywindows
idoval:org.mitre.oval:def:5853
statusaccepted
submitted2008-12-09T13:52:00-05:00
titleWindows Saved Search Vulnerability
version38

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 32651 CVE(CAN) ID: CVE-2008-4268 Microsoft Windows是微软发布的非常流行的操作系统。 在Windows Vista和Server 2008中,用户可以将搜索保存为.search-ms XML文件所生成的搜索文件夹。如果用户受骗打开了特制的.search-ms文件的话,就可能触发内存破坏,导致在有漏洞的系统上执行任意代码。 Microsoft Windows Vista SP1 Microsoft Windows Vista Microsoft Windows Server 2008 临时解决方法: * 临时更改与“.search-ms”文件扩展名有关的文件类型,在提升的命令提示符处输入以下命令:assoc .search-ms=xmlfile * 注销SearchFolder文件类型。 使用交互方法 1. 单击“开始”,单击“运行”,在“打开”框中键入Regedit,然后单击“确定”。 2. 找到并随后单击下列注册表子项: HKEY_CLASSES_ROOT\SearchFolder 3. 单击“文件”菜单并选择“导出”。 4. 在“导出注册表文件”对话框中,键入SearchFolder_file_association_registry_backup.reg,然后单击“保存”。 5. 按键盘上的“Delete”键删除该注册表项。当系统提示您通过“确认项删除”对话框删除注册表项时,单击“是”。 使用被管理的部署脚本 1. 使用包含下列命令的被管理的部署脚本创建注册表项的备份副本: Regedit.exe /e SearchFolder_registry_backup.reg HKEY_CLASSES_ROOT\SearchFolder 2. 接下来,将下列内容保存到扩展名为.REG的文件,例如Delete_SearchFolder_file_association.reg: Windows Registry Editor Version 5.00 [-HKEY_CLASSES_ROOT\SearchFolder] 3. 在目标计算机上的提升命令提示符处,使用下列命令运行以上注册表脚本: Regedit.exe /s Delete_SearchFolder_file_association.reg 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-075)以及相应补丁: MS08-075:Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/ms08-075.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/ms08-075.mspx?pf=true</a>
idSSV:4556
last seen2017-11-19
modified2008-12-11
published2008-12-11
reporterRoot
titleMicrosoft Windows保存搜索文件处理内存破坏漏洞(MS08-075)