Integer Overflow in Microsoft Windows Allowing Remote Code Execution via Compiled Help Files
CVE-2005-1208
Currently unrated
Key Information:
- Vendor
- Microsoft
- Vendor
- CVE Published:
- 14 June 2005
Summary
An integer overflow vulnerability exists in several versions of Microsoft Windows, including 98, 2000, XP SP2, and Server 2003 SP1. This vulnerability arises due to improper handling of specified field sizes in compiled Help (.CHM) files. A crafted Help file containing an oversized field can trigger a heap-based buffer overflow when processed by the system. Successful exploitation could allow an attacker to execute arbitrary code in the context of the affected application, potentially leading to unauthorized access and control of the affected system. Notably, this issue is often exploited through manipulated URLs in Internet Explorer.
References
EPSS Score
51% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved