Vulnerabilities > CVE-2008-4269 - Resource Management Errors vulnerability in Microsoft Windows Server 2008 and Windows Vista
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 7 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS08-075 |
bulletin_url | |
date | 2008-12-09T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 959349 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Windows Search Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS08-075.NASL |
description | The remote version of Windows contains a version of the Windows Shell that contains a vulnerability in the way it handles saved seaches. An attacker might use this flaw to trick an administrator to execute a saved search and therefore execute arbitrary commands on his behalf. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 35074 |
published | 2008-12-10 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/35074 |
title | MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349) |
code |
|
Oval
accepted | 2011-11-21T04:13:14.867-05:00 | ||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||
description | The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability." | ||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:6110 | ||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||
submitted | 2008-12-09T13:52:00-05:00 | ||||||||||||||||||||||||||||
title | Windows Search Parsing Vulnerability | ||||||||||||||||||||||||||||
version | 38 |
Saint
bid | 32652 |
description | Windows search-ms protocol handler command execution vulnerability |
id | win_patch_explorer1 |
osvdb | 50566 |
title | windows_search_ms_cmd |
type | client |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 32652 CVE(CAN) ID: CVE-2008-4269 Microsoft Windows是微软发布的非常流行的操作系统。 Windows资源管理器在解析search-ms协议时没有正确地处理参数,如果用户访问了恶意站点并通过特殊方式调用了search-ms协议处理器的话,就可能导致执行任意代码。 Microsoft Windows Vista SP1 Microsoft Windows Vista Microsoft Windows Server 2008 临时解决方法: * 在Windows资源管理器中禁用search-ms协议处理程序。 使用交互方法 1. 单击“开始”,单击“运行”,在“打开”框中键入“regedit”(不带引号),然后单击“确定”。 2. 找到并展开下列注册表子项:\search-ms\shell\open. 3. 单击Command。 4. 单击“文件”菜单并选择“导出”。 5. 在“导出注册表文件”对话框中,输入“Search-ms_pluggable_protocol_registry_backup.reg”,然后单击“保存”。 6. 通过双击编辑(默认)注册表值。从“数值数据:” 字段中清除所有数据。 7. 单击“确定”。 使用被管理的部署脚本 1. 使用包含以下命令的托管部署脚本创建注册表项的备份副本: regedit /e Search-ms_pluggable_protocol_registry_backup.reg HKEY_CLASSES_ROOT\search-ms\shell\open\command. 2. 接下来,将下列内容保存到扩展名为.REG的文件,例如"Disable_search-ms_pluggable_protocol.reg": Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\search-ms\shell\open\command] @="" 3. 在目标计算机上的提升命令提示符处,使用下列命令运行以上注册表脚本: Regedit.exe /s Disable_ search-ms_pluggable_protocol.reg 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-075)以及相应补丁: MS08-075:Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/ms08-075.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/ms08-075.mspx?pf=true</a> |
id | SSV:4555 |
last seen | 2017-11-19 |
modified | 2008-12-11 |
published | 2008-12-11 |
reporter | Root |
title | Microsoft Windows search-ms协议解析远程代码执行漏洞(MS08-075) |
References
- http://secunia.com/advisories/33053
- http://secunia.com/advisories/33053
- http://www.securitytracker.com/id?1021366
- http://www.securitytracker.com/id?1021366
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.vupen.com/english/advisories/2008/3387
- http://www.vupen.com/english/advisories/2008/3387
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-075
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-075
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6110
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6110