CVE-2008-4269

Severity

85%

Complexity

68%

Confidentiality

165%

http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Windows Search Parsing Vulnerability - CVE-2008-4269 A remote code execution vulnerability exists in Windows Explorer that allows an attacker to construct a malicious web page that includes a call to the search-ms protocol handler. The protocol handler in turn passes untrusted data to Windows Explorer.

The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability."

http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Windows Search Parsing Vulnerability - CVE-2008-4269 A remote code execution vulnerability exists in Windows Explorer that allows an attacker to construct a malicious web page that includes a call to the search-ms protocol handler. The protocol handler in turn passes untrusted data to Windows Explorer.

CVSS 2.0 Base Score 8.5. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:S/C:C/I:C/A:C).

Overview

First reported 16 years ago

2008-12-10 14:00:00

Last updated 6 years ago

2018-10-12 21:48:00

Affected Software

Microsoft Windows Server 2008

Microsoft Windows Server 2008 Itanium

Windows Server 2008 for 32-bit Systems

Microsoft Windows Server 2008 x64 (64-bit) (intial release)

Microsoft Windows Vista x64 (64-bit)

Microsoft Windows Vista gold

Microsoft Windows Vista Service Pack 1 (initial release)

Microsoft Windows Vista Service Pack 1 x64 (64-bit)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.