News

Microsoft Investigating Windows VBScript Security Hole

Microsoft released a security advisory on Monday describing a zero-day vulnerability involving some older Windows versions and VBScript when used with Internet Explorer.

The vulnerability permits a complicated exploit only on systems using Windows 2000, Windows XP and Windows Server 2003. Newer Windows versions aren't affected, according to the advisory. To pull off the exploit, users have to be diverted to a malicious Web site, and they have to push the F1 (Help) button on the keyboard while a script is running.

On Friday, third-party security firm iSEC Security Research published a proof of concept description of the vulnerability. Microsoft responded on Sunday in a blog post by Jerry Bryant, a senior manager with the Microsoft Security Response Center. Microsoft was investigating "new public claims of vulnerability involving the use of VBScript and Windows Help (HLP) files within Internet Explorer," according to Bryant.

The exploit could be triggered by "passing [a] malicious .HLP file to winhlp32," according to iSEC. It would permit an arbitrary command to be run by an attacker. iSEC also pointed to "a stack overflow vulnerability in winhlp32.exe."

The exploit allows a remote code execution attack via a malicious Web page. Microsoft's security advisory says that if "a malicious web site displayed a specially crafted dialog box and a user pressed the F1 key," then arbitrary code could be executed during that same browser session.

Bryant said that Microsoft has not yet seen any evidence of attacks exploiting this vulnerability. Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2 are not affected, according to Microsoft.

However, Bryant conceded that an inherent weakness exists involving the use of VBScript and Windows Help files with Internet Explorer.

"Windows Help files are included in a long list of what we refer to as 'unsafe file types'," he wrote in the blog post. "These are file types that are designed to invoke automatic actions during normal use of the files. While they can be very valuable productivity tools, they can also be used by attackers to try and compromise a system."

Microsoft did not appreciate how the vulnerability was reported. Bryant alluded to a need for "responsible disclosure" and the security advisory noted that it "was not responsibly disclosed." However, neither Bryant's note, nor the advisory, mentioned iSEC's proof of concept.

Microsoft may issue a security update, possibly through its monthly patch cycle. In the mean time, Microsoft suggested a workaround by changing Internet Explorer's security option.

"Setting the Internet zone security setting to High protects against this vulnerability by disabling Active Scripting, which is required in order to exploit this vulnerability," the security advisory noted. Microsoft also advised users against hitting the F1 key when prompted to do so by Web sites.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • IBM Giving Orgs a Governance Lifeline in Agentic AI Era

    Nearly overnight, organizations are facing brand-new challenges caused by self-directed AI systems (a.k.a. agentic AI). Big Blue is extending them some help.

  • Microsoft Launches Integrated E-mail Security Ecosystem for Defender for Office 365

    Microsoft is expanding its e-mail security capabilities with the launch of a new Integrated Cloud Email Security (ICES) ecosystem for Microsoft Defender for Office 365.

  • Microsoft Joins Workday's AI Agent Partner Network

    Microsoft has become a key partner in Workday's newly launched AI Agent Partner Network, aligning with other industry leaders to integrate AI agents into enterprise workforce systems.

  • LinkedIn CEO Ryan Roslansky To Lead Microsoft's Productivity Initiatives

    In a strategic leadership realignment, Microsoft has appointed LinkedIn CEO Ryan Roslansky to oversee its consumer and small business productivity software division, encompassing Microsoft 365, Teams and AI-driven tools like Copilot.