Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Alert: Microsoft Security Bulletin MS04-023 - Vulnerability in HTML Help Could Allow Code Execution (840315)
From: Russ (Russ.CooperRC.ON.CA)
Date: Tue Jul 13 2004 - 13:42:00 CDT
Microsoft Security Bulletin MS04-023:
Vulnerability in HTML Help Could Allow Code Execution (840315)
Version Number: 1.0
Issued Date: Tuesday, July 13, 2004
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Patch(es) Replaced: None
Caveats: Windows NT Workstation 4.0, Windows NT Server 4.0 and Windows NT 4.0 Terminal Server Edition are not affected by default. However if you have installed Internet Explorer 5.5 Service Pack 2 or Internet Explorer 6.0 Service Pack 1 you will have the vulnerable component on your system.
* Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service Pack 3, Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP and Microsoft Windows XP Service Pack 1
* Microsoft Windows XP 64-Bit Edition Service Pack 1
* Microsoft Windows XP 64-Bit Edition Version 2003
* Microsoft Windows Server(tm) 2003
* Microsoft Windows Server 2003 64-Bit Edition Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (Me) - Review the FAQ section of this bulletin for details about these operating systems.
* Internet Explorer 6.0 Service Pack 1 when installed on Windows NT 4.0 SP6a (Workstation, Server, or Terminal Server Edition)
* showHelp Vulnerability - CAN-2003-1041: A remote code execution vulnerability exists in the processing of a specially crafted showHelp URL. The vulnerability could allow malicious code to run in the Local Machine security zone in Internet Explorer, which could allow an attacker to take complete control of an affected system.
* HTML Help Vulnerability - CAN-2004-0201 A remote code execution vulnerability exists in HTML Help that could allow remote code execution on an affected system. If a user is logged on with administrative privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges
This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1642.17968)
Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor
NTBugtraq Editor's Note:
Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field.