Vulnerability Name:

CCN-64474

Published:2010-12-15
Updated:2010-12-15
Summary:Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by the loading of the Microsoft HTML Help application (hh.exe) in an insecure manner by the Remote Access Phonebook (rasphone.exe). By persuading a victim to open a specially-crafted PBK file from a WebDAV or SMB share using a vulnerable application, a remote attacker could exploit this vulnerability via a specially-crafted library to execute arbitrary code on the system.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.5 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: SA42527
Microsoft Remote Access Phonebook Insecure Executable Loading Vulnerability

Source: CCN
Type: Microsoft Web site
Microsoft Windows

Source: CCN
Type: OSVDB ID: 70000
Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution

Source: CCN
Type: BID-45404
Microsoft Windows Remote Access Phonebook Executable Loading Arbitrary Code Execution Vulnerability

Source: XF
Type: UNKNOWN
ms-win-phonebook-code-exec(64474)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows xp