|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Windows: code execution via VBScript/JScript
Synthesis of the vulnerability
An attacker can create a HTML page containing a VBScript/JScript script encoded in a malicious way in order to execute code on victim's computer.
Vulnerable products: Windows 2000, Windows 2003, Windows XP.
Severity of this weakness: 4/4.
Consequences of an attack: user access/rights.
Hacker's origin: document.
Creation date: 09/04/2008.
Références of this bulletin: 944338, BID-28551, CERTA-2008-AVI-193, CVE-2008-0083, MS08-022, VIGILANCE-VUL-7740.
Description of the vulnerability
VBScript and JScript scripts can be encoded to ensure that users cannot copy the code by looking at the source of the HTML page. Encoded scripts are decoded by VBScript.dll and JScript.dll.
However, when malformed data is decoded, a memory corruption can occur. This corruption leads to code execution.
An attacker can therefore create a HTML page containing a VBScript/JScript script encoded in a malicious way in order to execute code on victim's computer.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a network vulnerability patch. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.