CVE-2006-3351
CVSS5.4
发布时间 :2006-07-05 21:05:00
修订时间 :2008-09-05 17:06:52
NMCO    

[原文]Buffer overflow in Windows Explorer (explorer.exe) on Windows XP and 2003 allows user-assisted attackers to cause a denial of service (repeated crash) and possibly execute arbitrary code via a .url file with an InternetShortcut tag containing a long URL and a large number of "file:" specifiers.


[CNNVD]Microsoft Windows explorer.exe URL文件格式溢出漏洞(CNNVD-200607-022)

        Microsoft Windows是微软发布的非常流行的操作系统。
        Windows的Shell程序explorer.exe在处理包含畸形数据的".url"文件时存在问题,本地攻击者可能利用此漏洞导致用户机器上的explorer.exe进程崩溃。
        如果explorer.exe解析了包含有特别格式URL的*.url文件的话,就会导致崩溃。即使通过资源管理器试图删除这个文件时也会触发崩溃。

- CVSS (基础分值)

CVSS分值: 5.4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_2003_server:r2
cpe:/o:microsoft:windows_2003_server:standard:sp1
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit:sp1_beta_1
cpe:/o:microsoft:windows_xp:ibm_oem_version
cpe:/o:microsoft:windows_2003_server:3.1.0.3270
cpe:/o:microsoft:windows_xp::gold:professionalMicrosoft Windows XP Professional Gold
cpe:/o:microsoft:windows_2003_server:r2::datacenter_64-bit
cpe:/o:microsoft:windows_2003_server:itanium
cpe:/o:microsoft:windows_2003_server:enterprise::64-bit
cpe:/o:microsoft:windows_2003_server:standard_64-bit
cpe:/o:microsoft:windows_2003_server:standard
cpe:/o:microsoft:windows_2003_server:r2:sp1
cpe:/o:microsoft:windows_2003_server:standard::64-bit
cpe:/o:microsoft:windows_xp::sp1:home
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit
cpe:/o:microsoft:windows_2003_server:r2:sp1_beta_1
cpe:/o:microsoft:windows_2003_server:standard:sp1_beta_1
cpe:/o:microsoft:windows_2003_server:datacenter_edition_64-bit
cpe:/o:microsoft:windows_2003_server:datacenter_64-bit:sp1_beta_1
cpe:/o:microsoft:windows_xp:::home
cpe:/o:microsoft:windows_xp::goldMicrosoft windows xp_gold
cpe:/o:microsoft:windows_xp:::64-bit
cpe:/o:microsoft:windows_xp::sp2:home
cpe:/o:microsoft:windows_xp::sp2:tablet_pcMicrosoft windows xp_sp2 tablet_pc
cpe:/o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1_beta_1
cpe:/o:microsoft:windows_2003_server:web:sp1
cpe:/o:microsoft:windows_xp:::embedded
cpe:/o:microsoft:windows_2003_server:datacenter_64-bit:sp1
cpe:/o:microsoft:windows_2003_server:64-bit
cpe:/o:microsoft:windows_2003_server:enterprise:sp1_beta_1
cpe:/o:microsoft:windows_xp::sp1:media_centerMicrosoft windows xp_sp1 media_center
cpe:/o:microsoft:windows_2003_server:enterprise_edition_64-bit:sp1_beta_1
cpe:/o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1
cpe:/o:microsoft:windows_2003_server:r2::64-bit
cpe:/o:microsoft:windows_2003_server:sp1::itanium
cpe:/o:microsoft:windows_2003_server:datacenter_edition
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit:sp1
cpe:/o:microsoft:windows_xp::sp1:tablet_pcMicrosoft windows xp_sp1 tablet_pc
cpe:/o:microsoft:windows_2003_server:web:sp1_beta_1
cpe:/o:microsoft:windows_xp::sp1:64-bit
cpe:/o:microsoft:windows_2003_server:sp1
cpe:/o:microsoft:windows_2003_server:sp1::enterprise
cpe:/o:microsoft:windows_xp:::media_center
cpe:/o:microsoft:windows_xp::gold:home
cpe:/o:microsoft:windows_2003_server:enterprise_edition:sp1_beta_1
cpe:/o:microsoft:windows_2003_server:enterprise_edition:sp1
cpe:/o:microsoft:windows_2003_server:datacenter_edition:sp1
cpe:/o:microsoft:windows_2003_server:enterprise_edition_64-bit:sp1
cpe:/o:microsoft:windows_xp::sp2:media_centerMicrosoft windows xp_sp2 media_center
cpe:/o:microsoft:windows_2003_server:enterprise_edition_64-bit
cpe:/o:microsoft:windows_2003_server:web
cpe:/o:microsoft:windows_xp::sp1:embeddedMicrosoft windows xp_sp1 embedded
cpe:/o:microsoft:windows_xp:ibm_oem_version:sp1
cpe:/o:microsoft:windows_2003_server:enterprise:sp1
cpe:/o:microsoft:windows_2003_server:datacenter_edition:sp1_beta_1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3351
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3351
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-022
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/18838
(UNKNOWN)  BID  18838
http://www.securityfocus.com/archive/1/archive/1/439660/100/200/threaded
(UNKNOWN)  BUGTRAQ  20060706 Re: Windows Explorer URL File format overflow
http://www.securityfocus.com/archive/1/archive/1/439153/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060705 Windows Explorer URL File format overflow
http://xforce.iss.net/xforce/xfdb/27567
(UNKNOWN)  XF  win-explorer-url-dos(27567)
http://securityreason.com/securityalert/1186
(UNKNOWN)  SREASON  1186

- 漏洞信息

Microsoft Windows explorer.exe URL文件格式溢出漏洞
中危 缓冲区溢出
2006-07-05 00:00:00 2006-08-28 00:00:00
远程  
        Microsoft Windows是微软发布的非常流行的操作系统。
        Windows的Shell程序explorer.exe在处理包含畸形数据的".url"文件时存在问题,本地攻击者可能利用此漏洞导致用户机器上的explorer.exe进程崩溃。
        如果explorer.exe解析了包含有特别格式URL的*.url文件的话,就会导致崩溃。即使通过资源管理器试图删除这个文件时也会触发崩溃。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://www.microsoft.com/technet/security/

- 漏洞信息

28372
Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-07-05 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站