CERT-In Vulnerability Note
CIVN-2005-0054
Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution
Original Issue Date:June 15, 2005
Severity Rating: MEDIUM
Overview
Microsoft Step-By-Step Interactive Training is prone to a buffer overflow vulnerability. This is due to a boundary condition error related to validation of data in bookmark link files. As bookmark link files may originate from an external source, this issue may be remotely exploitable.
Description
A remote code execution vulnerability exists in Step-by-Step Interactive Training because of the way that Step-by-Step Interactive Training handles bookmark link files. An attacker could exploit the vulnerability by constructing a malicious bookmark link file that could potentially allow remote code execution if a user visited a malicious Web site or opened a malicious attachment that was provided in an e-mail message.
An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, user interaction is required to exploit this vulnerability.
Workaround
Disable the handler for Step-by-Step Interactive Training bookmark link files by removing the related registry keys. Do not open or save Step-by-Step Interactive Training bookmark link files .cbo, .cbl, .cbm received from untrusted sources. Block bookmark site file at an enterprise gateway. Remove Step-by-Step Interactive Training. Delete or rename the Step-by-Step Interactive Training .ini program file.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS05-031
Vendor Information
Microsoft Corporation
http://www.microsoft.com/technet/security/bulletin/MS05-031.mspx
References
Microsoft Security Bulletin
http://www.microsoft.com/technet/security/bulletin/MS05-031.mspx
Security Focus bugtraq id 13944
http://www.securityfocus.com/bid/13944
Secunia Advisory SA15669
http://secunia.com/advisories/15669/
iDEFENSE Security Advisory
http://idefense.com/application/poi/display?id=262&type=vulnerabilities&flashstatus=true
CVE Name
CAN-2005-1212
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|