Microsoft Security Bulletin MS05-008
Vulnerability in Windows Shell Could Allow Remote Code Execution (890047)

Issued: February 8, 2005
Version: 1.0

Who should read this document: Customers who use Microsoft Windows

Impact of Vulnerability: Remote Code Execution

Maximum Severity Rating: Important

Recommendation: Customers should apply the update at the earliest opportunity.

Security Update Replacement: None

Caveats: None

Important: The update for the ?Drag-and-Drop Vulnerability? (CAN-2005-0053) comes in two parts. It is addressed in part in this security bulletin. This security bulletin, together with security bulletin MS05-014, makes up the update for CAN-2005-0053. These updates do not have to be installed in any particular order. However, we recommend that you install both updates.

Tested Software and Security Update Download Locations:

Affected Software:
?Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4 ? Download the update
?Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 ? Download the update
?Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) ? Download the update
?Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) ? Download the update
?Microsoft Windows Server 2003 ? Download the update
?Microsoft Windows Server 2003 for Itanium-based Systems ? Download the update
?Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) ? Review the FAQ section of this bulletin for details about these operating systems.

The software in this list has been tested to determine whether the versions are affected. Other versions either no longer include security update support or may not be affected. To determine the support life cycle for your product and version, visit the Microsoft Support Lifecycle Web site.

Executive Summary:

This update resolves a newly-discovered vulnerability. The vulnerability is documented in the ?Vulnerability Details? section of this bulletin. A privilege elevation vulnerability exists in Windows because of the way that Windows handles drag-and-drop events. An attacker could exploit the vulnerability by constructing a malicious Web page. This malicious Web page could potentially allow an attacker to save a file on the user?s system if a user visited a malicious Web site or viewed a malicious e-mail message.

If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. However, user interaction is required to exploit this vulnerability.

We recommend that customers apply the update at the earliest opportunity.