Check Point Reference: | CPAI-2014-1287 |
Date Published: | 31 Mar 2014 |
Severity: | High |
Last Updated: | Monday 31 March, 2014 |
Source: | CVE-2005-0063 |
Industry Reference: | CVE-2005-0063 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Windows operating system provides facilities that make it possible to invoke different applications to handle different types of files. This makes it possible for a user to double click on a known image type file, for instance, and by that action launch the proper application to display or edit the file. A vulnerability exists in the way that the Microsoft Windows Shell component handles application associations. By persuading a user to open a malicious file with an unregistered file extension, the HTML Application Host on the target system can be activated to evaluate the embedded script. This vulnerability can allow an attacker to execute code in the same security context of the current logged in user. In an attack scenario where arbitrary code is attempted to be injected and executed on the target machine, a user may observe a window opened and quickly closed automatically as a result of the HTML Application Host component having been invoked. The behaviour of the target system, as a result of a successful attack, is dependent on the intention of the malicious code. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.
For information on how to update IPS, go to
SBP-2006-05,
Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: POP3.
Attack Information: Microsoft Windows Shell MSHTA Script Execution in OLE Files (MS05-016) - Ver2