First published: Wed Dec 10 2008(Updated: )
The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =gold | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4269 has a high severity rating as it allows remote attackers to execute arbitrary code.
To fix CVE-2008-4269, users should apply the latest security patches provided by Microsoft for affected Windows versions.
CVE-2008-4269 affects Microsoft Windows Vista and Windows Server 2008, including both Gold and SP1 versions.
CVE-2008-4269 can be exploited through crafted HTML documents that leverage the search-ms protocol handler.
Yes, CVE-2008-4269 remains a risk for unsupported systems as they do not receive security updates to address this vulnerability.