Overview
The Microsoft Windows HTML Help ActiveX control contains a cross-domain vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary commands or code with the privileges of the user running the control. The HTML Help control can be instantiated by an HTML document loaded in Internet Explorer or any other program that uses MSHTML.
Description
The Microsoft Windows HTML Help ActiveX control (hhctrl.ocx) is a major component of the Windows help system and is used to display HTML Help content. Internet Explorer (IE), Outlook, Outlook Express, and other programs that use MSHTML to process HTML content can instantiate the HTML Help control. The control has the ability to provide links to HTML content (URLs) called Related Topics. Related Topics content is opened in a window using a WebBrowser control. In effect, the Related Topics window is an IE browser window. When the Help Control uses Related Topics to open HTML content in a window, the content is associated to a domain (the source of the content), and the window is identified by a name. If one HTML Help control uses Related Topics to open a window containing content from one domain, and a second HTML Help control opens a window with the same name using content from a different domain, this content is determined to be in the security context of the first domain. This is a violation of the cross-domain security model. Using HTML Help controls and Related Topics with reused window names, an attacker can cause script from one domain to be executed in a different domain, including the Local Machine Zone. Script running in the Local Machine Zone has the ability to execute arbitrary commands with parameters using the HTML Help control. Script in the Local Machine Zone can also use ActiveX controls and ActiveX Data Objects (ADO) to create or download arbitrary data, write it to the local file system, and execute it. |
Impact
By convincing a user to view an HTML document (e.g., a web page or HTML email message), an attacker could execute arbitrary commands or code with the privileges of the user. The attacker could take any action as the user. If the user has administrative privileges, the attacker could take complete control of the user's system. The attacker could also read or modify content in other websites; for example, spoofing legitimate content or stealing authentication cookies. |
Solution
Install update |
There are a number of significant vulnerabilities in technologies relating to the IE domain/zone security model, local file system (Local Machine Zone) trust, the Dynamic HTML (DHTML) document object model (in particular, proprietary DHTML features), the HTML Help system, MIME type determination, the graphical user interface (GUI), and ActiveX. These technologies are implemented in operating system libraries that are used by IE and many other programs to provide web browser functionality. IE is integrated into Windows to such an extent that vulnerabilities in IE frequently provide an attacker significant access to the operating system. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/bulletin/MS05-001.mspx
- http://support.microsoft.com/kb/890175
- http://support.microsoft.com/kb/892641
- http://support.microsoft.com/kb/892675
- http://support.microsoft.com/kb/811630
- http://support.microsoft.com/kb/240797
- http://support.microsoft.com/kb/833633
- http://support.microsoft.com/kb/315933
- http://msdn.microsoft.com/workshop/author/om/xframe_scripting_security.asp
- http://msdn.microsoft.com/workshop/author/dhtml/sec_dhtml.asp
- http://msdn.microsoft.com/workshop/browser/overview/Overview.asp
- http://msdn.microsoft.com/workshop/browser/hosting/hosting.asp
- http://msdn.microsoft.com/workshop/browser/webbrowser/webbrowser.asp
- http://msdn.microsoft.com/workshop/author/dom/domoverview.asp
- http://msdn.microsoft.com/library/default.asp?url=/library/en-us/htmlhelp/html/vsconhh1start.asp
- http://msdn.microsoft.com/library/default.asp?url=/library/en-us/htmlhelp/html/vsconocxov.asp
- http://msdn.microsoft.com/library/default.asp?url=/library/en-us/htmlhelp/html/vsconocxrelatedtopics.asp
- http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2brows.mspx#EHAA
- http://www.microsoft.com/security/incident/settings.mspx
- http://jvn.jp/cert/JVNTA05-012B.html
- http://www.securityfocus.com/archive/1/387791
- http://www.gecadnet.ro/windows/?AID=1381
Acknowledgements
This vulnerability was publicly reported by Micael Evanchik. Preliminary reports were made by Paul and http-equiv.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2004-1043 |
Severity Metric: | 61.97 |
Date Public: | 2004-12-21 |
Date First Published: | 2005-01-12 |
Date Last Updated: | 2005-04-12 22:12 UTC |
Document Revision: | 53 |