Executive Summary

Informations
Name CVE-2007-3896 First vendor Publication 2007-10-10
Vendor Cve Last vendor Modification 2021-07-23

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3896

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:4581
 
Oval ID: oval:org.mitre.oval:def:4581
Title: Windows URI Handling Vulnerability
Description: The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.
Family: windows Class: vulnerability
Reference(s): CVE-2007-3896
Version: 1
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

SAINT Exploits

Description Link
Windows IE7 URI Handler command execution through Firefox More info here

Open Source Vulnerability Database (OSVDB)

Id Description
41090 Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbi...

Information Assurance Vulnerability Management (IAVM)

Date Description
2007-11-15 IAVM : 2007-A-0053 - Windows URI Handling Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0015397

Snort® IPS/IDS

Date Description
2018-01-17 Microsoft Windows ShellExecute and IE7 url handling code execution attempt
RuleID : 45175 - Revision : 1 - Type : OS-WINDOWS
2015-01-20 Multiple product mailto uri handling code execution attempt
RuleID : 32871 - Revision : 2 - Type : OS-WINDOWS
2015-01-20 Microsoft Windows ShellExecute and IE7 snews url handling code execution attempt
RuleID : 32870 - Revision : 2 - Type : OS-WINDOWS
2015-01-20 Microsoft Windows ShellExecute and IE7 snews url handling code execution attempt
RuleID : 32869 - Revision : 2 - Type : OS-WINDOWS
2014-01-10 Multiple product mailto uri handling code execution attempt
RuleID : 18173 - Revision : 7 - Type : OS-WINDOWS
2014-01-10 Multiple product mailto uri handling code execution attempt
RuleID : 18172 - Revision : 8 - Type : OS-WINDOWS
2014-01-10 Multiple product mailto uri handling code execution attempt
RuleID : 18171 - Revision : 8 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows ShellExecute and IE7 snews url handling code execution attempt
RuleID : 17468 - Revision : 11 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows ShellExecute and IE7 snews url handling code execution attempt
RuleID : 17467 - Revision : 9 - Type : OS-WINDOWS
2014-01-10 Multiple product snews uri handling code execution attempt
RuleID : 15684 - Revision : 10 - Type : OS-WINDOWS
2014-01-10 Multiple product mailto uri handling code execution attempt
RuleID : 13272 - Revision : 12 - Type : OS-WINDOWS
2014-01-10 Multiple product telnet uri handling code execution attempt
RuleID : 13271 - Revision : 12 - Type : OS-WINDOWS
2014-01-10 Multiple product news uri handling code execution attempt
RuleID : 13270 - Revision : 12 - Type : OS-WINDOWS
2014-01-10 Multiple product nntp uri handling code execution attempt
RuleID : 13269 - Revision : 12 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows ShellExecute and IE7 url handling code execution attempt
RuleID : 12688 - Revision : 16 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows ShellExecute and IE7 url handling code execution attempt
RuleID : 12687 - Revision : 12 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows ShellExecute and Internet Explorer 7 url handling code exec...
RuleID : 12664 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Microsoft Windows URI External handler arbitrary command attempt
RuleID : 12643 - Revision : 9 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2007-11-13 Name : Vulnerabilities in the Windows Shell may allow a user to elevate his privileges.
File : smb_nt_ms07-061.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/25945
BUGTRAQ http://marc.info/?l=bugtraq&m=119143780202107&w=2
http://marc.info/?l=bugtraq&m=119144449915918&w=2
http://marc.info/?l=bugtraq&m=119159924712561&w=2
http://marc.info/?l=bugtraq&m=119168062128026&w=2
http://marc.info/?l=bugtraq&m=119194714125580&w=2
http://marc.info/?l=bugtraq&m=119195904813505&w=2
http://www.securityfocus.com/archive/1/481493/100/100/threaded
http://www.securityfocus.com/archive/1/481505/100/0/threaded
http://www.securityfocus.com/archive/1/481624/100/0/threaded
http://www.securityfocus.com/archive/1/481664/100/0/threaded
http://www.securityfocus.com/archive/1/481671/100/0/threaded
http://www.securityfocus.com/archive/1/481680/100/0/threaded
http://www.securityfocus.com/archive/1/481839/100/0/threaded
http://www.securityfocus.com/archive/1/481846/100/0/threaded
http://www.securityfocus.com/archive/1/481867/100/0/threaded
http://www.securityfocus.com/archive/1/481871/100/0/threaded
http://www.securityfocus.com/archive/1/481881/100/0/threaded
http://www.securityfocus.com/archive/1/481887/100/0/threaded
http://www.securityfocus.com/archive/1/482090/100/0/threaded
http://www.securityfocus.com/archive/1/482292/100/0/threaded
http://www.securityfocus.com/archive/1/482437/100/0/threaded
CERT http://www.us-cert.gov/cas/techalerts/TA07-317A.html
CERT-VN http://www.kb.cert.org/vuls/id/403150
FULLDISC http://marc.info/?l=full-disclosure&m=119159477404263&w=2
http://marc.info/?l=full-disclosure&m=119168727402084&w=2
http://marc.info/?l=full-disclosure&m=119170531020020&w=2
http://marc.info/?l=full-disclosure&m=119171444628628&w=2
http://marc.info/?l=full-disclosure&m=119175323322021&w=2
http://marc.info/?l=full-disclosure&m=119180333805950&w=2
HP http://www.securityfocus.com/archive/1/484186/100/0/threaded
MISC http://blogs.zdnet.com/security/?p=577
http://www.heise-security.co.uk/news/96982
http://xs-sniper.com/blog/remote-command-exec-firefox-2005/
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07...
MSKB http://www.microsoft.com/technet/security/advisory/943521.mspx
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1018831
http://www.securitytracker.com/id?1018822
SECUNIA http://secunia.com/advisories/26201

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2021-07-27 00:24:34
  • Multiple Updates
2021-07-24 01:44:11
  • Multiple Updates
2021-07-24 01:04:00
  • Multiple Updates
2021-07-23 21:25:01
  • Multiple Updates
2020-05-23 00:20:09
  • Multiple Updates
2018-10-16 00:19:11
  • Multiple Updates
2018-10-13 00:22:37
  • Multiple Updates
2017-09-29 09:23:09
  • Multiple Updates
2016-06-28 23:56:17
  • Multiple Updates
2016-04-26 16:23:40
  • Multiple Updates
2015-01-20 21:24:59
  • Multiple Updates
2014-02-17 10:41:00
  • Multiple Updates
2014-01-19 21:24:19
  • Multiple Updates
2013-11-11 12:37:44
  • Multiple Updates
2013-05-11 10:32:14
  • Multiple Updates