{"vuid":"VU#989932","idnumber":"989932","name":"Microsoft contains a buffer overflow in the Local Troubleshooter ActiveX control (Tshoot.ocx)","keywords":["Microsoft","buffer overflow","Local Troubleshooter ActiveX control","Tshoot.ocx","Q826232","MS03-042"],"overview":"Microsoft Windows ships with a troubleshooting application to assist users with problems. A vulnerability in this application may permit a remote attacker to execute arbitrary code with the privileges of the current user.","clean_desc":"Microsoft Windows 2000 ships with an ActiveX control (Tshoot.ocx) that is a troubleshooting application to assist users with various system problems. A buffer overflow vulnerability exists in this control that may permit a remote attacker to execute arbitrary code with the privileges of the current user. Since this control is marked Safe for Scripting, a remote attacker who could trick the victim into viewing a crafted HTML web site, or HTML-based email message may be able to exploit this vulnerability. It should be noted that the Microsoft Local Troubleshooter ActiveX control is installed as a default part of the operating system on Windows 2000.","impact":"Exploitation of this vulnerability could lead to the arbitrary execution of code with the privileges of the current user.","resolution":"Microsoft has released patches in MS03-042 and Knowledgebase Article 826232 to address this issue. Apply the patches as appropriate. According to the Microsoft Advisory, Microsoft Windows 2000 with Service Pack 2, Service Pack 3 or Service Pack 4 are vulnerable to this issue. Windows NT 4.0, NT Server 4.0, Terminal Server Edition , Windows XP, Windows Millennium Edition and Windows Server 2003 are not affected by this issue.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in a Microsoft Security Bulletin.","author":"This document was written by Jason A Rafail and is based on MS03-042.","public":["http://www.microsoft.com/technet/security/bulletin/MS03-042.asp","http://support.microsoft.com/?kbid=826232"],"cveids":["CVE-2003-0661"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-10-15T18:03:05Z","publicdate":"2003-10-15T00:00:00Z","datefirstpublished":"2003-10-16T17:42:17Z","dateupdated":"2003-10-16T18:27:09Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"25.3125","cam_scorecurrentwidelyknown":"30.375","cam_scorecurrentwidelyknownexploited":"50.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":25.3125,"vulnote":null}