Информационная безопасность
[RU] switch to English


0day-уязвимость в Microsoft Internet Explorer
дополнено с 10 июля 2007 г.
Опубликовано:19 июля 2007 г.
Источник:
SecurityVulns ID:7904
Тип:клиент
Уровень опасности:
6/10
Описание:Нефильтруемые шел-символы при вызове приложения, отвечающего за поддержку протокола URL:.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
CVE:CVE-2007-3670 (Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data.")
Оригинальный текстdocumentIDEFENSE, iDefense Security Advisory 07.19.07: Multiple Vendor Multiple Product URI Handler Input Validation Vulnerability (19.07.2007)
 documentMOZILLA, Mozilla Foundation Security Advisory 2007-23 (19.07.2007)
 documentThor Larholm, [Full-disclosure] Internet Explorer 0day exploit (10.07.2007)
Файлы: Internet Explorer 0day Exploit

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород