CERTA-2002-AVI-194
Vulnerability from certfr_avis - Published: - Updated:
Toutes les versions de Windows sont livrées avec un contrôle ActiveX destiné à vérifier les certificats. Une vulnérabilité permet à un utilisateur mal intentionné d'effacer à distance des certificats de la machine cible et donc de provoquer un déni de service.
Description
Le contrôle ActiveX ``Certificate Enrollment Control'' permet de contrôler le numéro d'identification d'un certificat. L'appel de ce contrôle, via une page web, permet à un utilisateur mal intentionné d'effacer des certificats sur l'ordinateur cible, empêchant alors l'utilisation des fonctions associées à ces certificats (ex: chiffrement EFS, signature de mail, ...).
Contournement provisoire
Désactiver l'usage des ActiveX.
Solution
Appliquer le correctif #Q323172 fournit par Microsoft (consultez la section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Windows 98 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 98 Second Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Millenium ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows NT 4.0 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 2000 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP.",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLe contr\u00f4le ActiveX \\`\\`Certificate Enrollment Control\u0027\u0027 permet de\ncontr\u00f4ler le num\u00e9ro d\u0027identification d\u0027un certificat. L\u0027appel de ce\ncontr\u00f4le, via une page web, permet \u00e0 un utilisateur mal intentionn\u00e9\nd\u0027effacer des certificats sur l\u0027ordinateur cible, emp\u00eachant alors\nl\u0027utilisation des fonctions associ\u00e9es \u00e0 ces certificats (ex: chiffrement\nEFS, signature de mail, ...).\n\n## Contournement provisoire\n\nD\u00e9sactiver l\u0027usage des ActiveX.\n\n## Solution\n\nAppliquer le correctif \\#Q323172 fournit par Microsoft (consultez la\nsection Documentation).\n",
"cves": [],
"links": [],
"reference": "CERTA-2002-AVI-194",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2002-08-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Toutes les versions de Windows sont livr\u00e9es avec un contr\u00f4le ActiveX\ndestin\u00e9 \u00e0 v\u00e9rifier les certificats. Une vuln\u00e9rabilit\u00e9 permet \u00e0 un\nutilisateur mal intentionn\u00e9 d\u0027effacer \u00e0 distance des certificats de la\nmachine cible et donc de provoquer un d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans un contr\u00f4le ActiveX sur Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 #MS02-048 de Microsoft",
"url": "http://www.microsoft.com/technet/security/bulletin/MS02-048.asp"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.