Microsoft Investigating Windows VBScript Security Hole

Microsoft released a security advisory Monday describing a zero-day vulnerability involving some older Windows versions and VBScript when used with Internet Explorer.

The vulnerability permits a complicated exploit only on systems using Windows 2000, Windows XP, and Windows Server 2003. Newer Windows versions aren't affected, according to the advisory. To pull off the exploit, users have to be diverted to a malicious Web site, and they have to push the F1 (Help) button on the keyboard while a script is running.

Friday, third-party security firm iSEC Security Research published a proof of concept description of the vulnerability. Microsoft responded Sunday in a blog post by Jerry Bryant, a senior manager with the Microsoft Security Response Center. Microsoft was investigating "new public claims of vulnerability involving the use of VBScript and Windows Help (HLP) files within Internet Explorer," according to Bryant.

The exploit could be triggered by "passing [a] malicious .HLP file to winhlp32," according to iSEC. It would permit an arbitrary command to be run by an attacker. iSEC also pointed to "a stack overflow vulnerability in winhlp32.exe."

The exploit allows a remote code execution attack via a malicious Web page. Microsoft's security advisory says that if "a malicious Web site displayed a specially crafted dialog box and a user pressed the F1 key," then arbitrary code could be executed during that same browser session.

Bryant said that Microsoft has not yet seen any evidence of attacks exploiting this vulnerability. Windows Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2 are not affected, according to Microsoft.

However, Bryant conceded that an inherent weakness exists involving the use of VBScript and Windows Help files with Internet Explorer.

"Windows Help files are included in a long list of what we refer to as 'unsafe file types'," he wrote in the blog post. "These are file types that are designed to invoke automatic actions during normal use of the files. While they can be very valuable productivity tools, they can also be used by attackers to try and compromise a system."

Microsoft did not appreciate how the vulnerability was reported. Bryant alluded to a need for "responsible disclosure," and the security advisory noted that it "was not responsibly disclosed." However, neither Bryant's note, nor the advisory, mentioned iSEC's proof of concept.

Microsoft may issue a security update, possibly through its monthly patch cycle. In the meantime, Microsoft suggested a workaround by changing Internet Explorer's security option.

"Setting the Internet zone security setting to High protects against this vulnerability by disabling Active Scripting, which is required in order to exploit this vulnerability," the security advisory noted. Microsoft also advised users against hitting the F1 key when prompted to do so by Web sites.

About the Author

Jabulani Leffall is a business consultant and an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others. He consulted for Deloitte & Touche LLP and was a business and world affairs commentator on ABC and CNN.

Featured

  • two businessmen shaking hands

    What I Learned Working with an OPM

    At a time when higher education is being asked to do more with less, online program management partnerships can be the difference between simply surviving and truly thriving.

  • glowing digital brain above a chessboard with data charts and flowcharts

    Why AI Strategy Matters (and Why Not Having One Is Risky)

    If your institution hasn't started developing an AI strategy, you are likely putting yourself and your stakeholders at risk, particularly when it comes to ethical use, responsible pedagogical and data practices, and innovative exploration.

  • closeup of hands on laptop with various technology icons

    Microsoft Intros New AI-Powered Teaching and Learning Tools

    Microsoft has unveiled a number of updates bringing AI-powered experiences to teaching and learning. New features include a "Teach" AI tool for Copilot, a "Study and Learn" AI agent, and more.

  • magnifying glass highlighting a human profile silhouette, set over a collage of framed icons including landscapes, charts, and education symbols

    AWS, DeepBrain AI Launch AI-Generated Multimedia Content Detector

    Amazon Web Services (AWS) and DeepBrain AI have introduced AI Detector, an enterprise-grade solution designed to identify and manage AI-generated content across multiple media types. The collaboration targets organizations in government, finance, media, law, and education sectors that need to validate content authenticity at scale.