---------------------------------------------------------------------- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Microsoft Windows "MsgBox()" HLP File Execution Vulnerability SECUNIA ADVISORY ID: SA38727 VERIFY ADVISORY: http://secunia.com/advisories/38727/ DESCRIPTION: Maurycy Prodeus has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the VBScript "MsgBox()" function allowing the execution of arbitrary HLP files. This can be exploited to execute an HLP file from e.g. an SMB share by tricking a user into pressing F1 when viewing a specially crafted website. Successful exploitation allows execution of arbitrary commands via HLP macros. The vulnerability is confirmed with Internet Explorer 7 on a fully patched Windows XP SP3. Other versions may also be affected. SOLUTION: Avoid pressing F1 on untrusted websites. Disable Active Scripting support. PROVIDED AND/OR DISCOVERED BY: Maurycy Prodeus, iSEC Security Research ORIGINAL ADVISORY: Microsoft: http://blogs.technet.com/msrc/archive/2010/02/28/investigating-a-new-win32hlp-and-internet-explorer-issue.aspx iSEC Security Research: http://www.isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------