Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2007-1499 First vendor Publication 2007-03-17
Vendor Cve Last vendor Modification 2018-10-16

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Microsoft Internet Explorer 7.0 on Windows XP and Vista allows remote attackers to conduct phishing attacks and possibly execute arbitrary code via a res: URI to navcancl.htm with an arbitrary URL as an argument, which displays the URL in the location bar of the "Navigation Canceled" page and injects the script into the "Refresh the page" link, aka Navigation Cancel Page Spoofing Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1499

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1715
 
Oval ID: oval:org.mitre.oval:def:1715
Title: Navigation Cancel Page Spoofing Vulnerability
Description: Microsoft Internet Explorer 7.0 on Windows XP and Vista allows remote attackers to conduct phishing attacks and possibly execute arbitrary code via a res: URI to navcancl.htm with an arbitrary URL as an argument, which displays the URL in the location bar of the "Navigation Canceled" page and injects the script into the "Refresh the page" link, aka Navigation Cancel Page Spoofing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2007-1499
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

ExploitDB Exploits

id Description
2007-06-13 Microsoft Speech API ActiveX control Remote BoF Exploit (xp sp2)
2007-06-13 Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)

OpenVAS Exploits

Date Description
2010-07-08 Name : Microsoft Windows Vector Markup Language Vulnerabilities (929969)
File : nvt/ms07-004.nasl
2010-07-08 Name : Cumulative Security Update for Internet Explorer (933566)
File : nvt/ms07-033.nasl
2010-07-08 Name : Cumulative Security Update for Internet Explorer (939653)
File : nvt/ms07-057.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
35352 Microsoft IE navcancl.htm res: URI Phishing

34077 Microsoft IE navcancl.htm res: URI XSS

Snort® IPS/IDS

Date Description
2014-01-10 mk Asychronous Pluggable Protocol Handler ActiveX clsid unicode access
RuleID : 7959 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer mk Asychronous Pluggable Protocol Handler ActiveX...
RuleID : 7958 - Revision : 15 - Type : BROWSER-PLUGINS
2014-01-10 https Asychronous Pluggable Protocol Handler ActiveX clsid unicode access
RuleID : 7945 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer https Asychronous Pluggable Protocol Handler Acti...
RuleID : 7944 - Revision : 15 - Type : BROWSER-PLUGINS
2014-01-10 http Asychronous Pluggable Protocol Handler ActiveX clsid unicode access
RuleID : 7943 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer http Asychronous Pluggable Protocol Handler Activ...
RuleID : 7942 - Revision : 15 - Type : BROWSER-PLUGINS
2014-01-10 gopher Asychronous Pluggable Protocol Handler ActiveX clsid unicode access
RuleID : 7939 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer gopher Asychronous Pluggable Protocol Handler Act...
RuleID : 7938 - Revision : 15 - Type : BROWSER-PLUGINS
2014-01-10 ftp Asychronous Pluggable Protocol Handler ActiveX clsid unicode access
RuleID : 7935 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer ftp Asychronous Pluggable Protocol Handler Active...
RuleID : 7934 - Revision : 15 - Type : BROWSER-PLUGINS
2014-01-10 file or local Asychronous Pluggable Protocol Handler ActiveX clsid unicode ac...
RuleID : 7929 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer file or local Asychronous Pluggable Protocol Hand...
RuleID : 7928 - Revision : 15 - Type : BROWSER-PLUGINS
2014-01-10 CDL Asychronous Pluggable Protocol Handler ActiveX clsid unicode access
RuleID : 7905 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer CDL Asychronous Pluggable Protocol Handler Active...
RuleID : 7904 - Revision : 18 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer navcancl.htm url spoofing attempt
RuleID : 12014 - Revision : 13 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer CSS tag memory corruption attempt
RuleID : 11966 - Revision : 11 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer navcancl.htm url spoofing attempt
RuleID : 11834 - Revision : 21 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2007-06-12 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms07-033.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/22966
BUGTRAQ http://www.securityfocus.com/archive/1/462833/100/0/threaded
http://www.securityfocus.com/archive/1/462939/100/0/threaded
http://www.securityfocus.com/archive/1/462945/100/0/threaded
CERT http://www.us-cert.gov/cas/techalerts/TA07-163A.html
HP http://www.securityfocus.com/archive/1/471947/100/0/threaded
MISC http://aviv.raffon.net/2007/03/14/PhishingUsingIE7LocalResourceVulnerability....
http://news.com.com/2100-1002_3-6167410.html
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07...
OSVDB http://osvdb.org/35352
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1018235
SECUNIA http://secunia.com/advisories/24535
http://secunia.com/advisories/25627
SREASON http://securityreason.com/securityalert/2448
VUPEN http://www.vupen.com/english/advisories/2007/0946
http://www.vupen.com/english/advisories/2007/2153
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/33026

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2020-05-23 00:19:27
  • Multiple Updates
2019-03-19 12:02:23
  • Multiple Updates
2018-10-16 21:19:52
  • Multiple Updates
2018-10-13 00:22:36
  • Multiple Updates
2017-10-11 09:23:53
  • Multiple Updates
2017-07-29 12:02:05
  • Multiple Updates
2016-06-28 16:17:36
  • Multiple Updates
2016-04-26 15:52:52
  • Multiple Updates
2014-02-17 10:39:29
  • Multiple Updates
2014-01-19 21:23:58
  • Multiple Updates
2013-05-11 10:20:37
  • Multiple Updates
2012-11-07 00:14:31
  • Multiple Updates