CVE-2010-0483

vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability."
References
Link Resource
http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx Vendor Advisory
http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx Vendor Advisory
http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx Vendor Advisory
http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt Exploit
http://isec.pl/vulnerabilities10.html Exploit
http://secunia.com/advisories/38727 Vendor Advisory
http://securitytracker.com/id?1023668
http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk
http://www.kb.cert.org/vuls/id/612021 US Government Resource
http://www.microsoft.com/technet/security/advisory/981169.mspx Vendor Advisory
http://www.osvdb.org/62632
http://www.securityfocus.com/bid/38463 Exploit
http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/
http://www.us-cert.gov/cas/techalerts/TA10-103A.html US Government Resource
http://www.vupen.com/english/advisories/2010/0485 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-022
https://exchange.xforce.ibmcloud.com/vulnerabilities/56558
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8654
https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb Exploit
http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx Vendor Advisory
http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx Vendor Advisory
http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx Vendor Advisory
http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt Exploit
http://isec.pl/vulnerabilities10.html Exploit
http://secunia.com/advisories/38727 Vendor Advisory
http://securitytracker.com/id?1023668
http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk
http://www.kb.cert.org/vuls/id/612021 US Government Resource
http://www.microsoft.com/technet/security/advisory/981169.mspx Vendor Advisory
http://www.osvdb.org/62632
http://www.securityfocus.com/bid/38463 Exploit
http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/
http://www.us-cert.gov/cas/techalerts/TA10-103A.html US Government Resource
http://www.vupen.com/english/advisories/2010/0485 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-022
https://exchange.xforce.ibmcloud.com/vulnerabilities/56558
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8654
https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb Exploit
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
OR cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx - Vendor Advisory () http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx - Vendor Advisory
References () http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx - Vendor Advisory () http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx - Vendor Advisory
References () http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx - Vendor Advisory () http://blogs.technet.com/srd/archive/2010/03/01/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx - Vendor Advisory
References () http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt - Exploit () http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt - Exploit
References () http://isec.pl/vulnerabilities10.html - Exploit () http://isec.pl/vulnerabilities10.html - Exploit
References () http://secunia.com/advisories/38727 - Vendor Advisory () http://secunia.com/advisories/38727 - Vendor Advisory
References () http://securitytracker.com/id?1023668 - () http://securitytracker.com/id?1023668 -
References () http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk - () http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk -
References () http://www.kb.cert.org/vuls/id/612021 - US Government Resource () http://www.kb.cert.org/vuls/id/612021 - US Government Resource
References () http://www.microsoft.com/technet/security/advisory/981169.mspx - Vendor Advisory () http://www.microsoft.com/technet/security/advisory/981169.mspx - Vendor Advisory
References () http://www.osvdb.org/62632 - () http://www.osvdb.org/62632 -
References () http://www.securityfocus.com/bid/38463 - Exploit () http://www.securityfocus.com/bid/38463 - Exploit
References () http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/ - () http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/ -
References () http://www.us-cert.gov/cas/techalerts/TA10-103A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-103A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2010/0485 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0485 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-022 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-022 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/56558 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/56558 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8654 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8654 -
References () https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb - Exploit () https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb - Exploit

Information

Published : 2010-03-03 19:30

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0483

Mitre link : CVE-2010-0483

CVE.ORG link : CVE-2010-0483


JSON object : View

Products Affected

microsoft

  • windows_server_2003
  • internet_explorer
  • windows_2003_server
  • windows_xp
  • windows_2000
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')