Microsoft Windows HTML Help ActiveX Contol Cross-Domain Vulnerability
- Windows 98, Me, 2000, XP, and Server 2003
- Internet Explorer 5.x and 6.x
- Other Windows programs that use MSHTML
The Microsoft Windows HTML Help ActiveX control contains a cross-domain vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary commands or code with the privileges of the user running the control. The HTML Help control can be instantiated by an HTML document loaded in Internet Explorer or any other program that uses MSHTML.
The Microsoft Windows HTML Help ActiveX control (hhctrl.ocx) does not properly determine the source of windows opened by the Related Topics command. If an HTML Help control opens a Related Topics window in one domain, and a second control opens a Related Topics window using the same window name in a different domain, content from the second window is considered to be in the domain of the first window. This cross-domain vulnerability allows an attacker in one domain to read or modify content or execute script in a different domain, including the Local Machine Zone.
An attacker could exploit this vulnerability against Internet Explorer using a specially crafted web site. Other programs that use MSHTML, including Outlook and Outlook Express, could also act as attack vectors.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code or commands with the privileges of the user. The attacker could also read or modify data in other web sites. Ultimately, the attacker could take any action as the user, including running operating system commands, downloading and executing arbitrary programs, reading sensitive information, and spoofing web site contents.
Reports indicate that this vulnerability is being exploited by malicious code referred to as Phel.
Install an update
Install the appropriate update according to Microsoft Security Bulletin MS05-001. Note that the update may adversely affect the HTML Help system as described in Microsoft Knowledge Base articles 892641 and 892675.
Appendix A. References
- Vulnerability Note VU#972415 - http://www.kb.cert.org/vuls/id/972415
- Microsoft Security Bulletin MS05-001 - http://www.microsoft.com/technet/security/bulletin/ms05-001.mspx
- HTML Help files do not work correctly after you uninstall security update 890175 (MS05-001) - http://support.microsoft.com/kb/892641
- You cannot access HTML Help functionality on some Web sites after installing security update MS05-001 - http://support.microsoft.com/kb/892675
- Reusing MSHTML - http://msdn.microsoft.com/workshop/browser/hosting/hosting.asp
- HTML Help ActiveX Control Overview - http://msdn.microsoft.com/library/default.asp?url=/library/en-us/htmlhelp/html/vsconocxov.asp
- Related Topics - http://msdn.microsoft.com/library/default.asp?url=/library/en-us/htmlhelp/html/vsconocxrelatedtopics.asp
- About the Browser (Internet Explorer - WebBrowser) - http://msdn.microsoft.com/workshop/browser/overview/Overview.asp
- Introduction to URL Security Zones - http://msdn.microsoft.com/workshop/security/szone/overview/overview.asp#local
- CVE CAN-2004-1043 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1043
Feedback can be directed to the author: Art Manion.
January 12, 2005: Initial release
January 13, 2005: Updated impact with examples, added LMZ link
January 25, 2005: Fixed spelling and capitalization errors