HTTP: Microsoft Windows Shell Handler URL Validation

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Shell Handler. Attackers can trick victims into visiting hostile Web pages, which if successful, can result in remote code execution on the victim's system.

Extended Description

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. NOTE: Reports indicate that the issue can also be exploited via other applications that use the 'ShellExecute()' API.

Affected Products

Avaya messaging_application_server,Microsoft windows_2000_server

References

BugTraq: 37884

CVE: CVE-2010-0027

Short Name
HTTP:STC:WIN-SHELLHNDL
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2010-0027 Handler Microsoft Shell URL Validation Windows bid:37884
Release Date
02/09/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3725
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?