Multiple vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, disclose sensitive information, bypass certain security restrictions, and compromise a user's system.
1) Insufficient validation of drag and drop events from the "Internet" zone to local resources for valid images containing script code can be exploited by e.g. a malicious web site to plant arbitrary files types on a user's system via a specially crafted "Content-Disposition" HTTP header with a dot appended in the filename.
2) An error in the parsing of certain encoded URLs can be exploited to spoof the address bar and execute arbitrary HTML and script code in a user's browser session in context of an arbitrary site or security zone. This can further be exploited to execute arbitrary code.
Successful exploitation requires some user interaction.
Successful exploitation may allow execution of arbitrary code, but requires some user interaction.
Successful exploitation allows execution of arbitrary code.
5) Insufficient cross-zone restrictions can be exploited to link to local resources, when a user clicks a link on e.g a malicious web site.
6) An error in the handling of web sites inside the "Temporary Internet Files" folder can be exploited to cause a page to be loaded in context of the "Temporary Internet Files" folder, when a user clicks a link on e.g. a malicious web site.
Further exploitation involves gaining knowledge of a user's username and retrieving documents found inside the "Temporary Internet Files" folder.
7) A parsing error in the "codebase" attribute of the "object" tag can be exploited to execute local files with any file extension from the "Local Computer Zone" by appending "?.exe".
NOTE: A combination of vulnerabilities #5, #6, and #7 can be exploited to execute arbitrary code in Internet Explorer running on Windows 2000 and Windows XP SP1 when combined by a weakness in a third-party software, which stores malicious files in a predictable location.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Microsoft Internet Explorer Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.