The HTML Help facility in Windows includes an ActiveX control that provides much of its functionality. One of the functions exposed via the control contains an unchecked buffer, which could be exploited by a Web page hosted on an attacker?s site or sent to a user as an HTML mail. An attacker who successfully exploited the vulnerability would be able to run code in the security context of the user, thereby gaining the same privileges as the user on the system.
A second vulnerability exists because of flaws associated with the handling of compiled HTML Help files that contain shortcuts. Because shortcuts allow HTML Help files to take any desired action on the system, only trusted HTML Help files should be allowed to use them. Two flaws allow this restriction to be bypassed. First, the HTML Help facility incorrectly determines the Security Zone in the case where a Web page or HTML mail delivers a CHM file to the Temporary Internet Files folder and subsequently opens it. Instead of handling the CHM file in the correct zone--the one associated with the Web page or HTML mail that delivered it--the HTML Help facility incorrectly handles it in the Local Computer Zone, thereby considering it trusted and allowing it to use shortcuts. This error is compounded by the fact that the HTML Help facility doesn?t consider what folder the content resides in. Were it to do so, it could recover from the first flaw, as content within the Temporary Internet Folder is clearly not trusted, regardless of the Security Zone it renders in.
The attack scenario for this vulnerability would be complex, and involves using an HTML mail to deliver a CHM file that contains a shortcut, then making use of the flaws to open it and allow the shortcut to execute. The shortcut would be able to perform any action the user had privileges to perform on the system.
Like it? Share with your friends!
Other Windows Software of Developer «Microsoft»:
Microsoft System Center AVIcode Microsoft System Center AVIcode delivers market-leading .NET application performance monitoring capabilities to help ensure the availability of business-critical applications and services, regardless of where they are deployed. End-user experience and appl
Microsoft Office 2016 Preview (32 bit) Want to help shape the next release of Office? We're looking for Office enthusiasts like you to share your feedback on the new features and experiences we're developing. If you get excited about trying new software and don't mind a bump in the road here an
Windows 2000 IIS 5.0 Hotfix Checking Tool The HFCheck tool allows IIS5.0 administrators to ensure that their servers are up to date on all security patches. The tool can be run continuously or periodically, against the local machine or a remote one, using either a database on the Microsoft Web sit
Microsoft XNA Game Studio 3.0 Microsoft XNA Game Studio 3.0 enables hobbyists, academics, and independent game developers to easily create video games for Windows and the Microsoft Zune digital media player by using optimized cross-platform gaming libraries based on the .NET Framework.
Microsoft Golf demo Golf allows for four scoring options: traditional play, match play, skins, and team bestball. Computer-controlled players ensure you always find a challenging opponent. You can even bring an attitude to the course by selecting a player animation and sound
Microsoft Commerce Server 2000 Performance Toolkit Files Commerce Server Performance Toolkit, SVT Site tools, Supplier Site tools downloads. The Performance toolkit includes the Commerce Server 2000 data population tools, the TCA Toolkit, and the SVT Site PUP package. The SVT Site tools and the Supplier Site too
Windows Installer (Windows Vista/Server 2008) The Microsoft Windows Installer is an installation and configuration service. Windows Installer enables software users to efficiently install and configure products and applications. The installer can also provide software products with new capabilities to
Microsoft Publisher 2010 Microsoft Publisher 2010 adds new capabilities geared to help you create, print, and distribute professional-quality publications and sales and marketing materials. With the updated user interface, an improved print experience to help with more efficient p
Microsoft Security Assessment Tool Microsoft Security Assessment Tool employs a holistic approach to measuring your security posture by covering topics across people, process, and technology. Findings are coupled with prescriptive guidance and recommended mitigation efforts, including links
Note Vault Note Vault is the easiest way to take completely secure Notes and synchronize them to all your computers. All notes are stored in files called Vaults. Each Vault is encrypted using a password you provide. Without the password, your notes are completely saf
Prive Enigma Enigma is an utility to encrypt files. Its uses the Vernam cypher algorithm. This means the key is as long as the file to encrypt. For each file in a run a unique key is generated. Enigma supports public and private key encryption.Requirements:Windows 95/9
Supreme Spy Supreme Spy is a computer monitor or keylogger that records all activity on your computer, capturing keystrokes, programs, Internet Explorer Web sites, and screenshots. Featuring a unique playback mode, Supreme Spy lets you view captured keystrokes, progra
WinCrypto The application helps to encrypt and decrypt sensitive information. Well known RC4 encryption algorithm is used by WinCrypto application. The WinCrypto is optimized well and works extremely fast and it is easy to use. Drag a file from Windows Explorer and
The Vault More stable, more flexible, more efficient, more secure, bottom line more piece of mind from Jensen and Brusca Consulting Group. The Vault is back with new and improved features. A more flexible file repository, stronger AES encryption that's faster than p
MEO Encryption Software Free MEO is a data encryption application to encrypt or decrypt files of any type, including Microsoft Word, Excel and PDF documents. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data encryption technologie
Mobile Secretary for Desktop Let this Simple and Easy to use's Mobile Secretary keep all your secret informations in one place securely, now with better encryption method, flexibility and features !!When use together with Mobile Secretary 3.5 for mobile phone, you can make your data e
Folder Secure Folder secure is a user-friendly program for password-protecting files and folders. It prevents unauthorized access to users' important information and programs. The software makes the protected folders completely invisible, inaccessible or accessible in t
Remora USB File Guard Pro Remora USB File Guard Pro is designed to encrypt, compress, and auto back up files in your USB storage devices. With Remora USB File Guard Pro, you can secure all your files and store them in USB disk anytime and anywhere using strong AES 256-bit encryptio
MG-Shadow computer monitoring The most stable and easy to use software to secretly monitor anyone's computer. MG-Shadow records programs and windows launched, all keystrokes and passwords typed, visited Web sites, sent or received emails, chats, instant messengers, and screenshots. 100
Supported Operating Systems:
Windows 2000 |
Comments on :
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10