LOW
This advisory is classified as LOW severity because it describes a technique for message handling within dialog boxes rather than an actual security vulnerability. The described functionality can be used in both benign and malicious ways, but no real-world exploitability has been demonstrated.

The advisory discusses the extensibility point inside IsDialogMessage for intercepting messages, specifically ESC key presses. The attack vector involves a message filter hook that can manipulate how dialog messages are processed, potentially leading to unauthorized actions if exploited maliciously. This affects developers and users of applications that use IsDialogMessage with custom hooks.

Affected Systems
  • Windows applications using IsDialogMessage with custom hooks
Affected Versions: All versions that use the technique as described
Remediation
  • Review all custom message hook implementations for unintended side effects or malicious usage.
  • Ensure proper validation and authorization checks are in place when processing special keys like ESC within dialog boxes.
Stack Impact

This advisory does not directly affect common services such as nginx, docker, linux kernel, openssh, curl, openssl, python. It impacts custom application code that uses Windows API.

Source →