Short Name |
HTTP:STC:IE:CSRSS-HE-MSG |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Windows CSRSS HardError Message Box Vulnerability |
Release Date |
2010/10/25 |
Update Number |
1798 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Windows. It due to improper handling of "HardError" messages in Windows Client/Server Runtime Server Subsystem (CSRSS). A remote unauthenticated attacker can exploit this by enticing the target user to visit a malicious Web site using Internet Explorer. A successful attack allows the remote attackers to execute arbitrary code with the privileges of the System. The behavior of the target is entirely dependent on the intended function of the injected code. An unsuccessful attack results in a kernel error condition, which is also known as the "Blue Screen of Death." The vulnerable system can reboot or halt, which results in a denial-of-service condition.
Microsoft Windows is prone to a local denial-of-service vulnerability because the operating system fails to handle certain API calls with unexpected parameters. A local unprivileged attacker may exploit this issue by executing a malicious application. Successful exploits will allow attackers to crash the operating system, denying further service to legitimate users.