| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Microsoft Windows. It has been rated as critical. Affected by this issue is some unknown functionality in the library SHELL32.DLL. Performing a manipulation of the argument Name results in memory corruption. The attack can only be performed from the local network. Additionally, an exploit exists. It is suggested to install a patch to address this issue.
Details
A vulnerability classified as critical has been found in Microsoft Windows (Operating System) (version unknown). This affects an unknown function in the library SHELL32.DLL. The manipulation of the argument name with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was released 12/11/2003 by Aurélien Boudoux and Fred Chaverot with i2s-lab (Website). The advisory is shared at securiteam.com. The attack needs to approached within the local network. Technical details and a exploit are known.
The exploit is shared for download at securiteam.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $25k-$100k.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at windowsupdate.microsoft.com.
Further details are available at i2s-lab.com. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.0
VulDB Base Score: 5.5
VulDB Temp Score: 5.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Status: Proof-of-Concept
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: windowsupdate.microsoft.com
Timeline
12/11/2003 🔍12/11/2003 🔍
06/27/2019 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: securiteam.com⛔
Researcher: Aurélien Boudoux, Fred Chaverot
Organization: i2s-lab
Status: Not defined
GCVE (VulDB): GCVE-100-441
SecuriTeam: securiteam.com
Misc.: 🔍
Entry
Created: 12/11/2003 13:55Updated: 06/27/2019 12:30
Changes: 12/11/2003 13:55 (51), 06/27/2019 12:30 (2)
Complete: 🔍
Cache ID: 216:FF7:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.