ID |
CVE-2008-4269
|
Summary |
The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability." http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx
Windows Search Parsing Vulnerability - CVE-2008-4269
A remote code execution vulnerability exists in Windows Explorer that allows an attacker to construct a malicious web page that includes a call to the search-ms protocol handler. The protocol handler in turn passes untrusted data to Windows Explorer. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
|
CVSS |
Base: | 8.5 (as of 12-10-2018 - 21:48) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:S/C:C/I:C/A:C
|
msbulletin
via4
|
bulletin_id | MS08-075 | bulletin_url | | date | 2008-12-09T00:00:00 | impact | Remote Code Execution | knowledgebase_id | 959349 | knowledgebase_url | | severity | Critical | title | Vulnerabilities in Windows Search Could Allow Remote Code Execution |
|
oval
via4
|
accepted | 2011-11-21T04:13:14.867-05:00 | class | vulnerability | contributors | name | Jeff Ito | organization | Secure Elements, Inc. |
name | Prashanth A. | organization | SecPod Technologies |
| definition_extensions | comment | Microsoft Windows Vista (32-bit) is installed | oval | oval:org.mitre.oval:def:1282 |
comment | Microsoft Windows Vista x64 Edition is installed | oval | oval:org.mitre.oval:def:2041 |
comment | Microsoft Windows Server 2008 (32-bit) is installed | oval | oval:org.mitre.oval:def:4870 |
comment | Microsoft Windows Server 2008 (64-bit) is installed | oval | oval:org.mitre.oval:def:5356 |
comment | Microsoft Windows Vista (32-bit) Service Pack 1 is installed | oval | oval:org.mitre.oval:def:4873 |
comment | Microsoft Windows Vista x64 Edition Service Pack 1 is installed | oval | oval:org.mitre.oval:def:5254 |
comment | Microsoft Windows Server 2008 (ia-64) is installed | oval | oval:org.mitre.oval:def:5667 |
| description | The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability." | family | windows | id | oval:org.mitre.oval:def:6110 | status | accepted | submitted | 2008-12-09T13:52:00-05:00 | title | Windows Search Parsing Vulnerability | version | 41 |
|
refmap
via4
|
cert | TA08-344A | sectrack | 1021366 | secunia | 33053 | vupen | ADV-2008-3387 |
|
saint
via4
|
bid | 32652 | description | Windows search-ms protocol handler command execution vulnerability | id | win_patch_explorer1 | osvdb | 50566 | title | windows_search_ms_cmd | type | client |
|
Last major update |
12-10-2018 - 21:48 |
Published |
10-12-2008 - 14:00 |
Last modified |
12-10-2018 - 21:48 |