Public Vulnerability Reports

Microsoft Windows Interactive Training Buffer Overflow Vulnerability



Microsoft Interactive Training is an application included with some OEM
versions of Windows XP that allows users to receive multimedia training
on a variety of software products.


Remote exploitation of a buffer overflow vulnerability in Microsoft
Corp.'s orun32.exe application allows attackers to execute arbitrary
code under the context of the logged-on user.

The problem specifically exists when processing a malformed .cbo file. A
typical .cbo file might have the following contents:

[Microsoft Interactive Training]

If a malicious user crafts a file to contain a long string in the User
field, the user-supplied value is copied to a fixed-size stack buffer.
This allows an attacker to overwrite stack memory, such as the saved
return address or a Structured Exception Handler (SEH) pointer, and gain
control of execution flow.


Exploitation of this vulnerability allows remote attackers to execute
arbitrary code under the privileges of the currently logged-on user.
Exploitation requires that an attacker convince a target user to open a
malicious .cbo file. It is a common default configuration in OEM
versions of Windows XP to allow .cbo files to be opened without
confirmation via Internet Explorer; this allows an attacker to use an
IFRAME to force the .cbo file to be opened without interaction.
Microsoft Windows Interactive Training is included only in OEM versions
of Windows XP, thus minimizing the impact of this vulnerability.


iDEFENSE has verified that Microsoft Interactive Training, version on Windows XP, is vulnerable. All other versions are suspected
as vulnerable. Interactive Training is included by default in OEM
versions of Windows XP.

To determine whether a given system is vulnerable, check for the
presence of the following registry key:


If this key exists and contains a value, then the system has Interactive
Training installed, and it will process .cbo files.


Do not accept or open .cbo files from untrusted sources. Consider
filtering .cbo attachments at e-mail gateways.

To prevent .cbo files from being used with Microsoft Interactive
Training, remove the .cbo entry in HKEY_CLASSES_ROOT in the Windows
Registry. To do this, save the following text into a file called
"fix.reg" and open it to modify the registry:

   Windows Registry Editor Version 5.00


This will have the effect of disassociating .cbo files from the
Interactive Training application, which will limit functionality.
However, the application can still be used as before by manually opening
the executable and entering a username.


The vendor security advisory and appropriate patches are available at:


The Common Vulnerabilities and Exposures (CVE) project has assigned the
names CAN-2005-1212 to these issues. This is a candidate for inclusion
in the CVE list (, which standardizes names for
security problems.


02/23/2005   Initial vendor notification
02/23/2005   Initial vendor response
06/14/2005   Coordinated public disclosure


iDEFENSE Labs is credited with this discovery.

Get paid for vulnerability research

Free tools, research and upcoming events


Copyright © 2005 Verisign, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.