Overview
A vulnerability exists in the Microsoft Windows help viewer application that could allow a remote attacker to execute code of their choosing on a vulnerable system.
Description
The Microsoft Windows help viewer (winhlp32.exe) provides application assistance to users through a special type of file (.hlp). The help file format allows for compression of frequently used phrases. When this feature is employed, information about phrases, including size and number, is stored in a table in the help file. An unsafe use of information supplied during decoding of the phrase table could result in an incorrect memory allocation. This error results in a heap memory overflow that can be exploited by a malformed help file that specifies an invalid size in the phrase table. Note that this vulnerability may only affect versions of Microsoft Windows with certain language packs installed. The full scope of affected systems is unclear at the current time. |
Impact
A remote attacker may be able to execute arbitrary code on a vulnerable system through a maliciously crafted help file (.hlp). The malicious file could be introduced to a victim user through a web site or an email message. The intruder-supplied code would be run with the privileges of the user who opened the malicious help file. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to flashsky fangxing for reporting this vulnerability.
This document was written by Ken MacInnis.
Other Information
CVE IDs: | CVE-2004-1306 |
Severity Metric: | 15.68 |
Date Public: | 2004-12-23 |
Date First Published: | 2005-06-14 |
Date Last Updated: | 2005-06-22 18:59 UTC |
Document Revision: | 14 |