Advisory Details

May 12th, 2015

Microsoft Windows .MSC Stack Buffer Overflow Denial of Service Vulnerability

ZDI-15-191
ZDI-CAN-2759

CVE ID CVE-2015-1681
CVSS SCORE 5.0, AV:N/AC:L/Au:N/C:N/I:N/A:P
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
VULNERABILITY DETAILS


This vulnerability allows an attacker to cause a denial of service condition on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit open a malicious directory or device.

The specific flaw exists within the handling of Microsoft Management Console Snap-in Control files (.msc files). These files can contain encoded icons for display in the Windows shell or common file dialogs. By malforming this icon information, an attacker can overflow a statically allocated buffer on the stack and cause a denial of service condition. Because this is exposed through the common file dialogs, third-party applications or extensions may also be vulnerable to denial of service or execution of arbitrary code.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://technet.microsoft.com/library/security/MS15-054
DISCLOSURE TIMELINE
  • 2015-02-17 - Vulnerability reported to vendor
  • 2015-05-12 - Coordinated public release of advisory
CREDIT Michael Heerklotz
BACK TO ADVISORIES