Security flaws in the Help facility of most versions of the Windows operating system could allow an attacker to take control of a user's PC, Microsoft has warned.
All versions of the Windows operating system, from Windows 98 up, include a help function based on HTML (hypertext markup language). Much of its functionality is provided by an ActiveX control, a software component that can be called upon by a web page. An unchecked buffer in this control is what exposes the user's system, Microsoft said in security bulletin MS02-055.
The issue is rated "critical" by Microsoft because the help function can also be called by a website or HTML email, not just by applications on a user's PC. An attacker who invoked the help facility and exploited the flaw could take virtually any action on a PC that a user could take, Microsoft said.
Users of Outlook 2002 or Outlook Express 6.0 are protected from the email-based attack because those applications handle HTML email messages in a different manner. Users who installed the Microsoft-recommended Outlook Email Security Update are also protected, Microsoft said.
A software patch is available to protect a system against a website attack. However, the user needs to have Internet Explorer version 5.01, 5.5 or 6.0 installed for it to work, Microsoft said.
The patch also eliminates two other flaws in the Windows help facility. These flaws relate to the way HTML Help files are handled. These files can contain shortcuts that can take any action on a system. Only trusted files should be allowed to use these shortcuts, but the flaws allow a way around this restriction, Microsoft said.
Microsoft rates these flaws "moderate" because staging an attack exploiting them would be tough. An attacker would have to know the location of a user's Temporary Internet Files folder, which should be impossible, according to Microsoft.
Applying the patch does not provide a new ActiveX control for the help function, it updates the old control to remove the vulnerabilities, Microsoft said. This means that an attacker could remotely reinstall the vulnerable control, because it still has a valid digital signature from Microsoft.
This could be prevented by setting the so-called 'Kill Bit' on the ActiveX control, disallowing Internet Explorer from ever invoking it. However, the Kill Bit is not set because it would make help facilities in many applications that link to the old control unavailable, Microsoft said.
Microsoft acknowledges that an attacker could reintroduce the vulnerable control and suggests that users disable the downloading of ActiveX controls in Internet Explorer.
In a separate security bulletin on Wednesday, Microsoft warned of two "moderate" risk flaws in the file decompression utility that is part of Windows Me, Windows XP and the Windows 98 Plus! Pack.
These flaws could allow an attacker to either run code on a user's system or place files in a location of his choice. However, the vulnerabilities cannot be exploited without user intervention and cannot be exploited remotely, Microsoft said in bulletin MS02-054.
Microsoft security bulletin MS02-054 is at: http://www.microsoft.com/technet/security/bulletin/MS02-054.asp Microsoft security bulletin MS02-055 is at: http://www.microsoft.com/technet/security/bulletin/MS02-055.asp.