Check Point Reference: | CPAI-2004-158 |
Date Published: | 7 Oct 2009 |
Severity: | High |
Last Updated: | Thursday 16 June, 2016 |
Source: | |
Industry Reference: | CVE-2003-1041 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | An HTML Help URI provides a link to a compiled help file (.chm). When a user references this link, Windows will access the resource. To launch the Help URI with the local HTML Help Windows application, the method showHelp() can be used. There is a vulnerability in the way Microsoft's HTML help system validates .chm files. The URI parameter to this system through the showHelp method can reference a file on the local system outside of the help system through a directory traversal. When an attacker executes this method with a specially crafted URI, the attacker can execute arbitrary code on a vulnerable target. When the vulnerability is triggered, the target machine will load the compiled help file resource specified by the malicious URI. Depending on the malicious payload, code execution may take place on the vulnerable target, constrained by the privileges of the user currently logged in. If the user has administrative privileges, the attacker can take any action on the target system. The exact behaviour of the attack target is dependant on the executable content of the malicious compiled help file. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Microsoft showHelp (MS04-023)