Short Name |
APP:SBS-TRAINING-OF2 |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
APP |
Keywords |
Step-by-Step Interactive Training Overflow 2 |
Release Date |
2005/06/13 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Step-by-Step Interactive Training, which does not handle bookmark link files correctly. Attackers can create a malicious bookmark link file, that, when accessed by a user to visit a listed Web site or opened as an attachment within an e-mail, enables the attacker to execute code and/or completely control a target host.
Microsoft Step-By-Step Interactive Training is prone to a buffer overflow vulnerability. This is due to a boundary condition error related to validation of data in bookmark link files. As bookmark link files may originate from an external source, this issue may be remotely exploitable. Successful exploitation will result in execution of arbitrary code in the context of the currently logged in user. A number of third-party providers may supply the Step-by-Step Interactive training program as a part of their products. There is not a conclusive list of products that may have installed this software.