Check Point Advisories

Microsoft Windows Shell MSHTA Script Execution in OLE Files (MS05-016) - Ver2 (CVE-2005-0063)

Check Point Reference: CPAI-2005-224
Date Published: 31 Mar 2014
Severity: High
Last Updated: Monday 31 March, 2014
Source:
Industry Reference:CVE-2005-0063
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description The Windows operating system provides facilities that make it possible to invoke different applications to handle different types of files. This makes it possible for a user to double click on a known image type file, for instance, and by that action launch the proper application to display or edit the file. A vulnerability exists in the way that the Microsoft Windows Shell component handles application associations. By persuading a user to open a malicious file with an unregistered file extension, the HTML Application Host on the target system can be activated to evaluate the embedded script. This vulnerability can allow an attacker to execute code in the same security context of the current logged in user. In an attack scenario where arbitrary code is attempted to be injected and executed on the target machine, a user may observe a window opened and quickly closed automatically as a result of the HTML Application Host component having been invoked. The behaviour of the target system, as a result of a successful attack, is dependent on the intention of the malicious code.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Microsoft Windows Shell MSHTA Script Execution in OLE Files (MS05-016) - Ver2 protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Content Protection Violation.
Attack Information:  Microsoft Windows Shell MSHTA Script Execution in OLE Files (MS05-016) - Ver2

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK