Microsoft Corporation Information for VU#115632
Microsoft Windows help viewer vulnerable to heap overflow
- Vendor Information Help Date Notified: 10 Jan 2005
- Statement Date:
- Date Updated: 18 Jan 2005
Unknown. If you are the vendor named above, please contact us to update your status.
Thank you for your note. A buffer overflow is not needed to execute code with a .hlp file. A .hlp file type as referred to in the public report is for the most part equivalent to a .exe file and therefore is able to execute code as part of is documented functionality. There is no remote angle to this report, the attacker must persuade the target to download and execute the malicious file. Essentially, what flashsky is saying is if I can get a .exe file on your machine, I can execute code.
On another note, please reconsider using the word "Thanks" in the credit section as this issue was not responsibly disclosed to Microsoft.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.