{"id":2260,"date":"2010-03-04T22:57:32","date_gmt":"2010-03-05T03:57:32","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=2260"},"modified":"2022-12-30T12:44:38","modified_gmt":"2022-12-30T17:44:38","slug":"a-new-problem-caused-by-ie","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/a-new-problem-caused-by-ie\/","title":{"rendered":"A New Problem Caused by IE"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2265 \" style=\"border: 0pt none; margin: 0px 2px;\" title=\"A New Problem Caused by IE\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/security-computer-e1561320527132.jpg?resize=91%2C100&#038;ssl=1\" alt=\"A New Problem Caused by IE\" width=\"91\" height=\"100\" \/>The Microsoft Security Response Center (<a title=\"MSRC\" href=\"https:\/\/web.archive.org\/web\/20090327054321\/http:\/\/blogs.technet.com:80\/srd\/about.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MSRC<\/a>) Engineering team is <a href=\"https:\/\/web.archive.org\/web\/20100504112441\/http:\/\/blogs.technet.com:80\/srd\/archive\/2010\/03\/01\/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">reporting<\/a> a vulnerability involving VBScript and Windows Help files.\u00a0 In Microsoft Security Advisory <a href=\"https:\/\/web.archive.org\/web\/20110905081318\/http:\/\/www.microsoft.com:80\/technet\/security\/advisory\/981169.mspx\" target=\"_blank\" rel=\"noopener noreferrer\">981169<\/a>, the MSRC says that hitting the F1 Help key can activate a vulnerability in VBScript enabling Remote Code Execution. The new Microsoft threat involves any version of Internet Explorer (IE) on Windows 2000 and Windows XP.<\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-2267 size-full alignright\" style=\"border: 0pt none; margin: 2px;\" title=\"microsoft\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/microsoft-e1561320587870.jpg?resize=125%2C65&#038;ssl=1\" alt=\"Microsoft\" width=\"125\" height=\"65\" \/><\/a>The <a title=\"US-CERT\" href=\"http:\/\/www.us-cert.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">US-Cert<\/a> Vulnerability Note <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/612021\" target=\"_blank\" rel=\"noopener noreferrer\">VU#612021<\/a> says that any file displayed by the\u00a0 Internet Explorer (IE) engine can trigger an attack. IE&#8217;s engine is often used to render HTML for other applications, even if you don&#8217;t see the usual IE program window.<\/p>\n<h3>Trigger the execution of arbitrary code<\/h3>\n<p>This issue makes it possible for a malicious web page, an HTML e-mail or an e-mail attachment, or any file to display a dialog box that will trigger the execution of arbitrary code when the user presses the F1 key. The prompt can reappear when dismissed, nagging the user to press the F1 key. MSFT <a href=\"http:\/\/support.microsoft.com\/kb\/291369\" target=\"_blank\" rel=\"noopener noreferrer\">calls<\/a> the Windows Help files are an &#8220;inherently unsafe&#8221; file format. That means these files can run arbitrary code, thus the browser must prevent remote Windows Help files from executing automatically.<\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-2268 alignright\" style=\"border: 0pt none; margin: 2px;\" title=\"ie6_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/ie6_logo-e1561320634480.jpg?resize=73%2C73&#038;ssl=1\" alt=\"\" width=\"73\" height=\"73\" \/><\/a>MSFT suggests that as an interim workaround, users avoid pressing F1 on dialogs presented from web pages or other Internet content. If a dialog box repeatedly appears trying to convince the user to press F1, users should log off the system or use Task Manager to kill the Internet Explorer process.<\/p>\n<p>It is possible\u00a0 to mitigate the threat from the command line to lock down the legacy Windows Help system by\u00a0 typing:<br \/>\ncacls &#8220;%windir%\\winhlp32.exe&#8221; \/E \/P everyone:N<br \/>\nand to undo the change type:<br \/>\ncacls &#8220;%windir%\\winhlp32.exe&#8221; \/E \/R everyone<\/p>\n<p>Windows Server 2003 is affected as well, but the default IE configuration mitigates the threat. Windows Vista, Server 2008, and Windows 7 are not affected.<\/p>\n<p style=\"text-align: center;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-2271 alignright\" style=\"border: 0pt none;\" title=\"ballmer\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/ballmer-e1561320688561-150x118.jpg?resize=102%2C80&#038;ssl=1\" alt=\"Steve Balmmer\" width=\"102\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/ballmer-e1561320688561.jpg?resize=150%2C118&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/ballmer-e1561320688561.jpg?resize=75%2C59&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/03\/ballmer-e1561320688561.jpg?w=190&amp;ssl=1 190w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/p>\n<p>The MSRC <a href=\"https:\/\/web.archive.org\/web\/20100504112441\/http:\/\/blogs.technet.com:80\/srd\/archive\/2010\/03\/01\/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a> also describes how to change IE&#8217;s Internet and Local intranet security zone settings to &#8220;High&#8221; to prompt before running ActiveX Controls and Active Scripting in these zones a move that can also help protect against potential attacks.<\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSRC is warning of a VBScript and Windows Help files vulnerability that enables a Remote Code Execution on any version of IE on Windows 2000 and Windows XP<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3243,3240,156,157,970,82,421,3245,4,3244,445,1756],"class_list":["post-2260","post","type-post","status-publish","format-standard","hentry","category-security","tag-3243","tag-3240","tag-f1","tag-ie","tag-internet-explorer","tag-microsoft","tag-msft","tag-remote-code-execution","tag-security","tag-vbscript","tag-windows","tag-xp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2260"}],"version-history":[{"count":4,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2260\/revisions"}],"predecessor-version":[{"id":123454,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2260\/revisions\/123454"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}