Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:EXT:DOT-HLP

Severity

Minor

Recommended

No

Category

HTTP

Keywords

Windows Help File Download

Release Date

2004/12/23

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Windows Help File Download


This signature detects Microsoft Windows Help Files (.hlp) being downloaded using HTTP, which is not normally done over the Internet. Attackers can exploit vulnerabilities in the winhlp32.exe help file parser to create malicious help files. When a user downloads these help files, attackers can take control of the user's computer. Note: Because this signature detects only help file downloads, it can also trigger on benign help files.

Extended Description

Microsoft Windows is prone to a heap-based buffer overflow vulnerability. This issue exists in 'winhlp32.exe' and is exposed when a malformed phrase compressed Windows Help file (.hlp) is processed by the program. Successful exploitation may allow execution of arbitrary code in the context of the user that opens the malicious Help file. The Help file may originate from an external or untrusted source, so this vulnerability is considered remote in nature.

Affected Products

  • Microsoft windows_2000_advanced_server SP1
  • Microsoft windows_2000_advanced_server SP2
  • Microsoft windows_2000_advanced_server SP3
  • Microsoft windows_2000_advanced_server SP4
  • Microsoft windows_2000_advanced_server
  • Microsoft windows_2000_datacenter_server SP1
  • Microsoft windows_2000_datacenter_server SP2
  • Microsoft windows_2000_datacenter_server SP3
  • Microsoft windows_2000_datacenter_server SP4
  • Microsoft windows_2000_datacenter_server
  • Microsoft windows_2000_professional SP1
  • Microsoft windows_2000_professional SP2
  • Microsoft windows_2000_professional SP3
  • Microsoft windows_2000_professional SP4
  • Microsoft windows_2000_professional
  • Microsoft windows_2000_server SP1
  • Microsoft windows_2000_server SP2
  • Microsoft windows_2000_server SP3
  • Microsoft windows_2000_server SP4
  • Microsoft windows_2000_server
  • Microsoft windows_nt_enterprise_server 4.0
  • Microsoft windows_nt_enterprise_server 4.0 SP1
  • Microsoft windows_nt_enterprise_server 4.0 SP2
  • Microsoft windows_nt_enterprise_server 4.0 SP3
  • Microsoft windows_nt_enterprise_server 4.0 SP4
  • Microsoft windows_nt_enterprise_server 4.0 SP5
  • Microsoft windows_nt_enterprise_server 4.0 SP6
  • Microsoft windows_nt_enterprise_server 4.0 SP6a
  • Microsoft windows_nt_server 4.0
  • Microsoft windows_nt_server 4.0 SP1
  • Microsoft windows_nt_server 4.0 SP2
  • Microsoft windows_nt_server 4.0 SP3
  • Microsoft windows_nt_server 4.0 SP4
  • Microsoft windows_nt_server 4.0 SP5
  • Microsoft windows_nt_server 4.0 SP6
  • Microsoft windows_nt_server 4.0 SP6a
  • Microsoft windows_nt_terminal_server 4.0
  • Microsoft windows_nt_terminal_server 4.0 SP1
  • Microsoft windows_nt_terminal_server 4.0 SP2
  • Microsoft windows_nt_terminal_server 4.0 SP3
  • Microsoft windows_nt_terminal_server 4.0 SP4
  • Microsoft windows_nt_terminal_server 4.0 SP5
  • Microsoft windows_nt_terminal_server 4.0 SP6
  • Microsoft windows_nt_terminal_server 4.0 SP6a
  • Microsoft windows_nt_workstation 4.0
  • Microsoft windows_nt_workstation 4.0 SP1
  • Microsoft windows_nt_workstation 4.0 SP2
  • Microsoft windows_nt_workstation 4.0 SP3
  • Microsoft windows_nt_workstation 4.0 SP4
  • Microsoft windows_nt_workstation 4.0 SP5
  • Microsoft windows_nt_workstation 4.0 SP6
  • Microsoft windows_nt_workstation 4.0 SP6a
  • Microsoft windows_server_2003_datacenter_edition SP1 Beta 1
  • Microsoft windows_server_2003_datacenter_edition
  • Microsoft windows_server_2003_datacenter_edition_itanium SP1 Beta 1
  • Microsoft windows_server_2003_datacenter_edition_itanium
  • Microsoft windows_server_2003_enterprise_edition SP1 Beta 1
  • Microsoft windows_server_2003_enterprise_edition
  • Microsoft windows_server_2003_enterprise_edition_itanium SP1 Beta 1
  • Microsoft windows_server_2003_enterprise_edition_itanium
  • Microsoft windows_server_2003_standard_edition SP1 Beta 1
  • Microsoft windows_server_2003_standard_edition
  • Microsoft windows_server_2003_web_edition SP1 Beta 1
  • Microsoft windows_server_2003_web_edition
  • Microsoft windows_xp_64-bit_edition SP1
  • Microsoft windows_xp_64-bit_edition
  • Microsoft windows_xp_64-bit_edition_version_2003 SP1
  • Microsoft windows_xp_64-bit_edition_version_2003
  • Microsoft windows_xp_home SP1
  • Microsoft windows_xp_home SP2
  • Microsoft windows_xp_home
  • Microsoft windows_xp_media_center_edition SP1
  • Microsoft windows_xp_media_center_edition SP2
  • Microsoft windows_xp_media_center_edition
  • Microsoft windows_xp_professional SP1
  • Microsoft windows_xp_professional SP2
  • Microsoft windows_xp_professional

References

  • BugTraq: 12092
  • CVE: CVE-2006-4138
  • CVE: CVE-2004-1306
  • CVE: CVE-2004-1361

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out