Vulnerabilities > CVE-2008-4269 - Resource Management Errors vulnerability in Microsoft Windows Server 2008 and Windows Vista

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability."

Vulnerable Configurations

Part Description Count
OS
Microsoft
7

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS08-075
bulletin_url
date2008-12-09T00:00:00
impactRemote Code Execution
knowledgebase_id959349
knowledgebase_url
severityCritical
titleVulnerabilities in Windows Search Could Allow Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS08-075.NASL
descriptionThe remote version of Windows contains a version of the Windows Shell that contains a vulnerability in the way it handles saved seaches. An attacker might use this flaw to trick an administrator to execute a saved search and therefore execute arbitrary commands on his behalf.
last seen2020-06-01
modified2020-06-02
plugin id35074
published2008-12-10
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/35074
titleMS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(35074);
 script_version("1.29");
 script_cvs_date("Date: 2018/11/15 20:50:30");

 script_cve_id("CVE-2008-4268", "CVE-2008-4269");
 script_bugtraq_id(32651, 32652);
 script_xref(name:"MSFT", value:"MS08-075");
 script_xref(name:"MSKB", value:"958624");
 script_xref(name:"IAVB", value:"2008-B-0083");

 script_name(english:"MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349)");
 script_summary(english:"Determines the presence of update 959349");

 script_set_attribute(attribute:"synopsis", value:
"Vulnerabilities in the Windows Shell may allow an attacker to execute
privileged commands on the remote host.");
 script_set_attribute(attribute:"description", value:
"The remote version of Windows contains a version of the Windows Shell
that contains a vulnerability in the way it handles saved seaches.

An attacker might use this flaw to trick an administrator to execute a saved
search and therefore execute arbitrary commands on his behalf.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-075");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows Vista and 2008.");
 script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(399);

 script_set_attribute(attribute:"vuln_publication_date", value:"2008/12/09");
 script_set_attribute(attribute:"patch_publication_date", value:"2008/12/09");
 script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/10");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_set_attribute(attribute:"stig_severity", value:"II");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS08-075';
kb = '958624';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(vista:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  hotfix_is_vulnerable(os:"6.0", sp:0, file:"Explorer.exe", version:"6.0.6000.16771", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"6.0", sp:0, file:"Explorer.exe", version:"6.0.6000.20947", min_version:"6.0.6000.20000", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"6.0", sp:1, file:"Explorer.exe", version:"6.0.6001.18164", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"6.0", sp:1, file:"Explorer.exe", version:"6.0.6001.22298", min_version:"6.0.6001.22000", bulletin:bulletin, kb:kb)
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_warning();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

accepted2011-11-21T04:13:14.867-05:00
classvulnerability
contributors
  • nameJeff Ito
    organizationSecure Elements, Inc.
  • namePrashanth A.
    organizationSecPod Technologies
definition_extensions
  • commentMicrosoft Windows Vista (32-bit) is installed
    ovaloval:org.mitre.oval:def:1282
  • commentMicrosoft Windows Vista x64 Edition is installed
    ovaloval:org.mitre.oval:def:2041
  • commentMicrosoft Windows Server 2008 (32-bit) is installed
    ovaloval:org.mitre.oval:def:4870
  • commentMicrosoft Windows Server 2008 (64-bit) is installed
    ovaloval:org.mitre.oval:def:5356
  • commentMicrosoft Windows Vista (32-bit) Service Pack 1 is installed
    ovaloval:org.mitre.oval:def:4873
  • commentMicrosoft Windows Vista x64 Edition Service Pack 1 is installed
    ovaloval:org.mitre.oval:def:5254
  • commentMicrosoft Windows Server 2008 (ia-64) is installed
    ovaloval:org.mitre.oval:def:5667
descriptionThe search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability."
familywindows
idoval:org.mitre.oval:def:6110
statusaccepted
submitted2008-12-09T13:52:00-05:00
titleWindows Search Parsing Vulnerability
version38

Saint

bid32652
descriptionWindows search-ms protocol handler command execution vulnerability
idwin_patch_explorer1
osvdb50566
titlewindows_search_ms_cmd
typeclient

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 32652 CVE(CAN) ID: CVE-2008-4269 Microsoft Windows是微软发布的非常流行的操作系统。 Windows资源管理器在解析search-ms协议时没有正确地处理参数,如果用户访问了恶意站点并通过特殊方式调用了search-ms协议处理器的话,就可能导致执行任意代码。 Microsoft Windows Vista SP1 Microsoft Windows Vista Microsoft Windows Server 2008 临时解决方法: * 在Windows资源管理器中禁用search-ms协议处理程序。 使用交互方法 1. 单击“开始”,单击“运行”,在“打开”框中键入“regedit”(不带引号),然后单击“确定”。 2. 找到并展开下列注册表子项:\search-ms\shell\open. 3. 单击Command。 4. 单击“文件”菜单并选择“导出”。 5. 在“导出注册表文件”对话框中,输入“Search-ms_pluggable_protocol_registry_backup.reg”,然后单击“保存”。 6. 通过双击编辑(默认)注册表值。从“数值数据:” 字段中清除所有数据。 7. 单击“确定”。 使用被管理的部署脚本 1. 使用包含以下命令的托管部署脚本创建注册表项的备份副本: regedit /e Search-ms_pluggable_protocol_registry_backup.reg HKEY_CLASSES_ROOT\search-ms\shell\open\command. 2. 接下来,将下列内容保存到扩展名为.REG的文件,例如&quot;Disable_search-ms_pluggable_protocol.reg&quot;: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\search-ms\shell\open\command] @=&quot;&quot; 3. 在目标计算机上的提升命令提示符处,使用下列命令运行以上注册表脚本: Regedit.exe /s Disable_ search-ms_pluggable_protocol.reg 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-075)以及相应补丁: MS08-075:Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/ms08-075.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/ms08-075.mspx?pf=true</a>
idSSV:4555
last seen2017-11-19
modified2008-12-11
published2008-12-11
reporterRoot
titleMicrosoft Windows search-ms协议解析远程代码执行漏洞(MS08-075)