CVE-2004-0199
CVSS5.1
发布时间 :2004-06-14 00:00:00
修订时间 :2016-10-17 22:41:46
NMCOS    

[原文]Help and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm).


[CNNVD]Microsoft Windows HSC DVD Driver升级代码执行漏洞(MS04-015)(CNNVD-200406-046)

        
        Microsoft XP帮助支持中心(Help and Support Center)是一款统一的帮助和支持服务中心,可把所有的支持服务,如远程协助、自动更新、联机帮助以及其他工具等集中在一个地方。
        Microsoft HSC在处理DVD驱动升级的URI时存在问题,远程攻击者可以利用这个漏洞以目标用户进程权限在系统上执行任意命令。
        Microsoft HSC包含各种HTML和Javascript文件,可由HSC内部使用。HTML文件属于本地电脑安全域,用于执行外部帮助程序。
        通过构建特殊的URL,攻击者可以使用户的本地机器启动和处理helpctr.exe,并传递注入的URL到应用程序,然后在支持帮助中心出现帮助和支持DvD升级对话框。
        通过DvD升级页面,注入URL连接到"upgrade now"按钮,通过点击此功能,用户就会被提示打开/保存提供(攻击者)文件的对话框。这允许攻击者在HSC上初始化DvDupgrade操作,注如入的JavaScript代码会以这些HTML文件上下文运行,如"HCP://system/DVDUpgrd/dvdupgrd.htm"。通过这个方法,攻击者可以在本地电脑域中运行脚本,如下载启动恶意EXE程序。
        

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_xp::sp1:home
cpe:/o:microsoft:windows_2003_server:web
cpe:/o:microsoft:windows_xp::gold:professionalMicrosoft Windows XP Professional Gold
cpe:/o:microsoft:windows_2003_server:enterprise::64-bit
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit
cpe:/o:microsoft:windows_2003_server:r2::64-bit
cpe:/o:microsoft:windows_xp::goldMicrosoft windows xp_gold
cpe:/o:microsoft:windows_2003_server:r2::datacenter_64-bit
cpe:/o:microsoft:windows_xp:::64-bit
cpe:/o:microsoft:windows_2003_server:standard::64-bit
cpe:/o:microsoft:windows_xp::sp1:64-bit
cpe:/o:microsoft:windows_2003_server:r2
cpe:/o:microsoft:windows_xp:::home

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1032Windows Server 2003 Help and Support Center HCP URL Validation Vulnerability
oval:org.mitre.oval:def:1008Windows XP Help and Support Center HCP URL Validation Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0199
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0199
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200406-046
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108437759930820&w=2
(UNKNOWN)  BUGTRAQ  20040512 MS04-015 - Windows Help Center - Dvdupgrade
http://marc.info/?l=full-disclosure&m=108430407801825&w=2
(UNKNOWN)  FULLDISC  20040512 MS04-015 - Windows Help Center - Dvdupgrade
http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt
(UNKNOWN)  MISC  http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt
http://www.kb.cert.org/vuls/id/484814
(VENDOR_ADVISORY)  CERT-VN  VU#484814
http://www.microsoft.com/technet/security/bulletin/MS04-015.mspx
(VENDOR_ADVISORY)  MS  MS04-015
http://www.securityfocus.com/bid/10321
(VENDOR_ADVISORY)  BID  10321
http://xforce.iss.net/xforce/xfdb/16095
(VENDOR_ADVISORY)  XF  win-hcp-code-execution(16095)

- 漏洞信息

Microsoft Windows HSC DVD Driver升级代码执行漏洞(MS04-015)
中危 输入验证
2004-06-14 00:00:00 2005-10-20 00:00:00
远程  
        
        Microsoft XP帮助支持中心(Help and Support Center)是一款统一的帮助和支持服务中心,可把所有的支持服务,如远程协助、自动更新、联机帮助以及其他工具等集中在一个地方。
        Microsoft HSC在处理DVD驱动升级的URI时存在问题,远程攻击者可以利用这个漏洞以目标用户进程权限在系统上执行任意命令。
        Microsoft HSC包含各种HTML和Javascript文件,可由HSC内部使用。HTML文件属于本地电脑安全域,用于执行外部帮助程序。
        通过构建特殊的URL,攻击者可以使用户的本地机器启动和处理helpctr.exe,并传递注入的URL到应用程序,然后在支持帮助中心出现帮助和支持DvD升级对话框。
        通过DvD升级页面,注入URL连接到"upgrade now"按钮,通过点击此功能,用户就会被提示打开/保存提供(攻击者)文件的对话框。这允许攻击者在HSC上初始化DvDupgrade操作,注如入的JavaScript代码会以这些HTML文件上下文运行,如"HCP://system/DVDUpgrd/dvdupgrd.htm"。通过这个方法,攻击者可以在本地电脑域中运行脚本,如下载启动恶意EXE程序。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在Windows注册表中删除如下键值:
        HKEY_CLASSES_ROOT\HCP
        厂商补丁:
        Microsoft
        ---------
        Microsoft已经为此发布了一个安全公告(MS04-015)以及相应补丁:
        MS04-015:Vulnerability in Help and Support Center Could Allow Remote Code Execution (840374)
        链接:
        http://www.microsoft.com/technet/security/bulletin/MS04-015.mspx

        补丁下载:
        Microsoft Windows XP Home SP1:
        Microsoft Upgrade Security Update for Windows XP (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=563F65A3-D793-47B4-A607-948CAA5B3454&displaylang=en

        Microsoft Windows XP Professional SP1:
        Microsoft Upgrade Security Update for Windows XP (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=563F65A3-D793-47B4-A607-948CAA5B3454&displaylang=en

        Microsoft Windows XP 64-bit Edition SP1:
        Microsoft Upgrade Security Update for Windows XP 64 Bit Edition (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=EB954F03-EFC6-45FA-B87C-E29135199DC9&displaylang=en

        Microsoft Windows XP 64-bit Edition Version 2003 SP1:
        Microsoft Upgrade Security Update for Windows XP 64 Bit Edition (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=EB954F03-EFC6-45FA-B87C-E29135199DC9&displaylang=en

        Microsoft Upgrade Security Update for Microsoft Windows Server 2003 and Windows XP 64 Bit Edition Vers 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=E05DE6AB-FB0D-4A0E-B34E-BB69B9D6BA74&displaylang=en

        Microsoft Upgrade Security Update for Windows XP 64 Bit Edition 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=EB954F03-EFC6-45FA-B87C-E29135199DC9&displaylang=en

        Microsoft Windows XP Professional :
        Microsoft Upgrade Security Update for Windows XP (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=563F65A3-D793-47B4-A607-948CAA5B3454&displaylang=en

        Microsoft Windows XP Home :
        Microsoft Upgrade Security Update for Windows XP (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=563F65A3-D793-47B4-A607-948CAA5B3454&displaylang=en

        Microsoft Windows XP 64-bit Edition :
        Microsoft Upgrade Security Update for Windows XP 64 Bit Edition (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=EB954F03-EFC6-45FA-B87C-E29135199DC9&displaylang=en

        Microsoft Windows Server 2003 Standard Edition :
        Microsoft Upgrade Security Update for Windows Server 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=50AD42D7-81BD-4F96-9AD1-0E67310551DF&displaylang=en

        Microsoft Windows Server 2003 Enterprise Edition :
        Microsoft Upgrade Security Update for Windows Server 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=50AD42D7-81BD-4F96-9AD1-0E67310551DF&displaylang=en

        Microsoft Windows Server 2003 Web Edition :
        Microsoft Upgrade Security Update for Windows Server 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=50AD42D7-81BD-4F96-9AD1-0E67310551DF&displaylang=en

        Microsoft Windows Server 2003 Enterprise Edition 64-bit :
        Microsoft Upgrade Security Update for Microsoft Windows Server 2003 and Windows XP 64 Bit Edition Vers 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=E05DE6AB-FB0D-4A0E-B34E-BB69B9D6BA74&displaylang=en

        Microsoft Windows XP 64-bit Edition Version 2003 :
        Microsoft Upgrade Security Update for Windows XP 64 Bit Edition (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=EB954F03-EFC6-45FA-B87C-E29135199DC9&displaylang=en

        Microsoft Upgrade Security Update for Microsoft Windows Server 2003 and Windows XP 64 Bit Edition Vers 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=E05DE6AB-FB0D-4A0E-B34E-BB69B9D6BA74&displaylang=en

        Microsoft Upgrade Security Update for Windows XP 64 Bit Edition 2003 (KB840374)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=EB954F03-EFC6-45FA-B87C-E29135199DC9&displaylang=en

- 漏洞信息

6053
Microsoft Windows Help and Support Center HCP URL Code Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Microsoft Windows XP and Windows Server 2003 contains a flaw that may allow a remote attacker to execute arbitrary code. The issue is due to improper validation of HCP (Help Center and Support) URLs. With a specially crafted request, an remote attacker can cause arbitrary code execution with privileges of the victim, once the URL is clicked, resulting in a loss of integrity.

- 时间线

2004-05-11 Unknow
2004-05-11 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft Windows HSC DVD Driver Upgrade Code Execution Vulnerability
Input Validation Error 10321
Yes No
2004-05-11 12:00:00 2009-07-12 04:07:00
Discovery is credited to Donnie Werner.

- 受影响的程序版本

Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows XP Home SP1
Microsoft Windows XP Home
Microsoft Windows XP 64-bit Edition Version 2003 SP1
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP 64-bit Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Enterprise Edition Itanium 0
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Datacenter Edition Itanium 0
Microsoft Windows Server 2003 Datacenter Edition

- 漏洞讨论

A security vulnerability has been reported in Microsoft Windows XP and Server 2003 operating systems. This issue exists in the Help and Support Center (HSC) and is due to how the feature handles HCP invocation URIs for DVD driver upgrades.

This issue could be exploited from a malicious web page or HTML e-mail to cause a malicious executable to be run on a vulnerable system. This would occur in the context of the victim user, though it has been reported that significant user interaction is required for exploitation to occur.

While this issue may be exploited through Internet Explorer, it should also be noted that third-party web client software could also invoke HSC via a HCP URI.

- 漏洞利用

There is no exploit required, though it is believed that a victim would have to perform a number of actions manually for exploitation to be successful.

A proof-of-concept is provided at the following location:
http://www.exploitlabs.com/files/advisories/EXPL-A-2003-027-helpctr.txt

- 解决方案

Microsoft has released fixes to address this issue.


Microsoft Windows Server 2003 Web Edition

Microsoft Windows Server 2003 Standard Edition

Microsoft Windows XP Home

Microsoft Windows XP 64-bit Edition Version 2003

Microsoft Windows XP 64-bit Edition

Microsoft Windows XP Home SP1

Microsoft Windows Server 2003 Enterprise Edition

Microsoft Windows Server 2003 Enterprise Edition Itanium 0

Microsoft Windows XP Professional

Microsoft Windows XP 64-bit Edition Version 2003 SP1

Microsoft Windows XP Professional SP1

Microsoft Windows Server 2003 Datacenter Edition

Microsoft Windows XP 64-bit Edition SP1

Microsoft Windows Server 2003 Datacenter Edition Itanium 0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站