CERT-In Vulnerability Note
CIVN-2011-0183
Microsoft Windows Time Component Arbitrary Code Execution Vulnerability
Original Issue Date:December 14, 2011
Severity Rating: HIGH
Systems Affected
- Windows XP SP 3
- Windows XP Professional x64 Edition SP 2
- Windows Server 2003 SP 2
- Windows Server 2003 x64 Edition SP 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista SP 2
- Windows Vista x64 Edition SP 2
- Windows Server 2008 for 32-bit Systems SP 2 [Server Core installation not affected]
- Windows Server 2008 for x64-based Systems SP 2 [Server Core installation not affected]
- Windows Server 2008 for Itanium-based Systems SP 2
- Windows 7 for 32-bit Systems
- Windows 7 for 32-bit Systems SP 1
- Windows 7 for x64-based Systems
- Windows 7 for x64-based Systems SP 1
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems SP 1 [Server Core installation not affected]
- Windows Server 2008 R2 for Itanium-based Systems
- Windows Server 2008 R2 for Itanium-based Systems SP 1
Overview
A vulnerability has been reported in Microsoft Windows, which could be exploited by remote attackers to execute arbitrary code on the affected system.
Description
The vulnerability is caused due to deprecated time behavior in the bundled Microsoft Time ActiveX control component, datime.dll.
An unauthenticated, remote attacker could exploit this vulnerability by enticing a target user to open a specially crafted web page using Internet Explorer. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the system with the privileges of the targeted user.
Workaround
- Disable time behavior in Windows XP and Windows Server 2003
- Prevent binary behaviors from being used in Internet Explorer
Note: For detailed steps and impact of these workarounds refer to Microsoft Security Bulletin MS11-090
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS11-090
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms11-090
References
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms11-090
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=24493
Sophos
http://esp.sophos.com/support/knowledgebase/article/116470.html
Secunia
http://secunia.com/advisories/47099/
CVE Name
CVE-2011-3397
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|