SB2007101002 - Remote code execution via URI handlers in Microsoft Windows 



SB2007101002 - Remote code execution via URI handlers in Microsoft Windows

Published: October 10, 2007 Updated: December 8, 2016

Security Bulletin ID SB2007101002
Severity
Critical
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) OS command injection (CVE-ID: CVE-2007-3896)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insufficient filtration of URIs in Shell32.dll when open applications via URL handlers (e.g. mailto:). A remote attacker can create a specially crafted URI, containing invalid sequence of % characters, trick the victim to click on it and execute arbitrary system commands with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability is being actively exploited.


Remediation

Install update from vendor's website.