CVE-2003-0907

Help and Support Center in Microsoft Windows XP SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code via quotation marks in an hcp:// URL, which are not quoted when constructing the argument list to HelpCtr.exe.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020065.html Broken Link
http://marc.info/?l=bugtraq&m=108196864221676&w=2 Third Party Advisory
http://www.ciac.org/ciac/bulletins/o-114.shtml Broken Link
http://www.idefense.com/application/poi/display?id=100&type=vulnerabilities Broken Link
http://www.kb.cert.org/vuls/id/260588 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/10119 Broken Link Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA04-104A.html Broken Link Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15704 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1000 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 Broken Link
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020065.html Broken Link
http://marc.info/?l=bugtraq&m=108196864221676&w=2 Third Party Advisory
http://www.ciac.org/ciac/bulletins/o-114.shtml Broken Link
http://www.idefense.com/application/poi/display?id=100&type=vulnerabilities Broken Link
http://www.kb.cert.org/vuls/id/260588 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/10119 Broken Link Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA04-104A.html Broken Link Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15704 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1000 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020065.html - Broken Link () http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020065.html - Broken Link
References () http://marc.info/?l=bugtraq&m=108196864221676&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=108196864221676&w=2 - Third Party Advisory
References () http://www.ciac.org/ciac/bulletins/o-114.shtml - Broken Link () http://www.ciac.org/ciac/bulletins/o-114.shtml - Broken Link
References () http://www.idefense.com/application/poi/display?id=100&type=vulnerabilities - Broken Link () http://www.idefense.com/application/poi/display?id=100&type=vulnerabilities - Broken Link
References () http://www.kb.cert.org/vuls/id/260588 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/260588 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/10119 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/10119 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA04-104A.html - Broken Link, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-104A.html - Broken Link, Third Party Advisory, US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15704 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/15704 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1000 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1000 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 - Broken Link

13 Feb 2024, 18:00

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
References (MS) https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 - (MS) https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 - Patch, Vendor Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 - Broken Link
References (CERT) http://www.us-cert.gov/cas/techalerts/TA04-104A.html - Third Party Advisory, US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA04-104A.html - Broken Link, Third Party Advisory, US Government Resource
References (CIAC) http://www.ciac.org/ciac/bulletins/o-114.shtml - (CIAC) http://www.ciac.org/ciac/bulletins/o-114.shtml - Broken Link
References (BID) http://www.securityfocus.com/bid/10119 - (BID) http://www.securityfocus.com/bid/10119 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://www.idefense.com/application/poi/display?id=100&type=vulnerabilities - (MISC) http://www.idefense.com/application/poi/display?id=100&type=vulnerabilities - Broken Link
References (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020065.html - (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020065.html - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15704 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15704 - Third Party Advisory, VDB Entry
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=108196864221676&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=108196864221676&w=2 - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1000 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1000 - Broken Link
First Time Microsoft windows Server 2003
CWE NVD-CWE-Other CWE-88

Information

Published : 2004-06-01 04:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0907

Mitre link : CVE-2003-0907

CVE.ORG link : CVE-2003-0907


JSON object : View

Products Affected

microsoft

  • windows_server_2003
  • windows_xp
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')