|
|
|
|
| |
Credit:
The information has been provided by Microsoft Product Security.
The original article can be found at: http://www.microsoft.com/technet/security/bulletin/ms08-038.mspx
|
| |
Affected Software:
* Windows Vista and Windows Vista Service Pack 1 - Remote Code Execution - Important - None
* Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1 - Remote Code Execution - Important - None
* Windows Server 2008 for 32-bit Systems* - Remote Code Execution - Important - None
* Windows Server 2008 for x64-based Systems* - Remote Code Execution - Important - None
* Windows Server 2008 for Itanium-based Systems - Remote Code Execution - Important - None
*Windows Server 2008 server core installation affected. For supported editions of Windows Server 2008, this update applies, with the same severity rating, whether or not Windows Server 2008 was installed using the Server Core installation option.
Non-Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Windows XP Service Pack 2 and Windows XP Service Pack 3
* Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
* Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
* Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
* Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
Windows Saved Search Vulnerability - CVE-2008-1435
A remote code execution vulnerability exists when saving a specially crafted search file within Windows Explorer. This operation causes Windows Explorer to exit and restart in an exploitable manner.
CVE Information:
CVE-2008-1435
Mitigating Factors for Windows Saved Search Vulnerability - CVE-2008-1435
Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:
* The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must open and save an attachment that is sent in an e-mail message.
* In a Web-based attack scenario, an attacker could host a Web site that contains a malformed saved-search (.search-ms) file. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Attempts to exploit this vulnerability require user interaction.
* An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.
Workarounds for Windows Saved Search Vulnerability - CVE-2008-1435
Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality.
* Temporarily change the file type associated with the .search-ms file extension. Enter the following command at an elevated command prompt:
assoc .search-ms=xmlfile
Impact of workaround. Saved-search files will open as XML files in Internet Explorer.
How to undo the workaround. Enter the following command at an elevated command prompt:
assoc .search-ms=SearchFolder
* Modify the registry to deny users the ability to open saved-search files or to access the saved search folder.
To modify the registry key, follow these steps:
Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe.
1. Click Start, click Run, type Regedit in the Open box, and then click OK.
2. Locate and then expand the following registry subkey:
HKEY_CLASSES_ROOT\SearchFolder
Click Edit, and then click Permissions
Note Make a note of the permissions that are listed in this dialog box so that you can restore them to their original values at a later time.
3. Click Advanced.
4. Click to clear the Include inheritable permissions from this object's parent check box. You are prompted to click Copy, Remove, or Cancel. Click Remove, and then click OK.
5. You receive a message that states that no one will be able to access this registry key. Click Yes, and then click OK to close the Permissions for SearchFolder dialog box.
Impact of workaround. Users will be unable to open saved search files or access the saved search folder.
How to undo the workaround. Restore the previously configured permissions on the registry key by clicking to check Include inheritable permissions from this object's parent and then clicking OK two times.
* Unregister the SearchFolder file type.
To modify the registry key, follow these steps:
Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe.
Using the Interactive Method
1. Click Start, click Run, type Regedit in the Open box, and then click OK.
2. Locate and then click the following registry subkey:
HKEY_CLASSES_ROOT\SearchFolder
3. Click the File menu and select Export.
4. In the Export Registry File dialog box, enter SearchFolder_file_association_registry_backup.reg and click Save.
Note This will create a backup of this registry key in the My Documentsfolder by default.
5. Press the Delete key on the keyboard to delete the registry key. When prompted to delete the registry key via the Confirm Key Delete dialog box, click Yes.
Using a Managed Deployment Script
1. Create a backup copy of the registry keys by using a managed deployment script that contains the following commands:
Regedit.exe /e SearchFolder_registry_backup.reg
HKEY_CLASSES_ROOT\SearchFolder
2. Next, save the following to a file with a .REG extension, such as Delete_SearchFolder_file_association.reg:
Windows Registry Editor Version 5.00
[-HKEY_CLASSES_ROOT\SearchFolder]
3. Run the above registry script on the target machine with the following command from an elevated command prompt:
Regedit.exe /s Delete_SearchFolder_file_association.reg
Impact of workaround. Double-clicking on a saved search folder will no longer open a window displaying the search results.
How to undo the workaround:
Using the Interactive Method
1. Click Start, click Run, type Regedit in the Open box, and then click OK.
2. Click the File menu and select Import.
3. In the Import Registry File dialog box, select SearchFolder_file_association_registry_backup.reg and click Open.
Using a Managed Deployment Script
Restore the original state by running the following command:
Regedit.exe /s SearchFolder_registry_backup.reg
|
|
|
|
|