Integer Overflow in Microsoft Windows Allowing Remote Code Execution via Compiled Help Files
CVE-2005-1208

Currently unrated

Key Information:

Vendor
Microsoft
Vendor
CVE Published:
14 June 2005

Summary

An integer overflow vulnerability exists in several versions of Microsoft Windows, including 98, 2000, XP SP2, and Server 2003 SP1. This vulnerability arises due to improper handling of specified field sizes in compiled Help (.CHM) files. A crafted Help file containing an oversized field can trigger a heap-based buffer overflow when processed by the system. Successful exploitation could allow an attacker to execute arbitrary code in the context of the affected application, potentially leading to unauthorized access and control of the affected system. Notably, this issue is often exploited through manipulated URLs in Internet Explorer.

References

EPSS Score

51% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.