Short Name |
HTTP:STC:DL:MS-HELP-CNT-BO |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Help Workshop CNT Help Contents Buffer Overflow |
Release Date |
2010/10/01 |
Update Number |
1784 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Help Workshop. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Microsoft Help Workshop fails to properly bounds-check user-supplied input in '.cnt' files. A malformed '.cnt' file containing an unusually long string may be used to cause a stack-based buffer-overflow, allowing the execution of arbitrary code. A successful exploit would result in the execution of arbitrary code within the security context of the user running the eaffected application.