Executive Summary

Informations
Name MS02-047 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cumulative Patch for Internet Explorer (Q323759)

CWE : Common Weakness Enumeration

% Id Name

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1026
 
Oval ID: oval:org.mitre.oval:def:1026
Title: IE5.01,SP3 File Disclosure via Redirects Vulnerability
Description: The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Family: windows Class: vulnerability
Reference(s): CVE-2002-0648
Version: 4
Platform(s): Microsoft Windows 2000
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1148
 
Oval ID: oval:org.mitre.oval:def:1148
Title: IE6 Installed XP,SP2 File Disclosure via Redirects Vulnerability
Description: The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Family: windows Class: vulnerability
Reference(s): CVE-2002-0648
Version: 3
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1207
 
Oval ID: oval:org.mitre.oval:def:1207
Title: IE6,SP1 File Disclosure via Redirects Vulnerability
Description: The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Family: windows Class: vulnerability
Reference(s): CVE-2002-0648
Version: 4
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:608
 
Oval ID: oval:org.mitre.oval:def:608
Title: IE6 for Server 2003 File Disclosure via Redirects Vulnerability
Description: The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Family: windows Class: vulnerability
Reference(s): CVE-2002-0648
Version: 7
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:776
 
Oval ID: oval:org.mitre.oval:def:776
Title: IE5.01,SP4 File Disclosure via Redirects Vulnerability
Description: The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Family: windows Class: vulnerability
Reference(s): CVE-2002-0648
Version: 4
Platform(s): Microsoft Windows 2000
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7

ExploitDB Exploits

id Description
2002-04-16 Microsoft Internet Explorer 5 Dialog Same Origin Policy Bypass Variant Vulner...

OpenVAS Exploits

Date Description
2005-11-03 Name : IE 5.01 5.5 6.0 Cumulative patch (890923)
File : nvt/smb_nt_ms02-005.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
17314 Microsoft IE XML Redirect Information Disclosure

5162 Microsoft IE Legacy Data-island Capability Read Arbitrary XML File

5152 Microsoft Legacy Text Formatting ActiveX Control Overflow

5134 Microsoft IE Reference Local HTML Resource Script Execution

5129 Microsoft IE Download File Origin Spoofing

Microsoft Internet Explorer contains a flaw that may allow a malicious user to Spoof the source of a download. The issue is triggered when specifically crafted URL is entered into Internet Explorer. It is possible that the flaw may trick the user into thinking the download is from a trusted site resulting in a loss of integrity.
3003 Microsoft IE/Outlook OBJECT Cross Domain Scripting

Microsoft Internet Explorer allows a remote attacker to create a malcicious Web page that could bypass the same origin policy restriction of a document. This issue is due to the OBJECT element and its handling of embedded documents from the same site. A remote attacker could create a malicious HTML document that calls the OBJECT element of the embedded WebBrowser control to allow Cross Domain Scripting and execute script on an externally referenced host.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Internet Explorer ActiveLabel ActiveX object access
RuleID : 4147 - Revision : 12 - Type : BROWSER-PLUGINS

Nessus® Vulnerability Scanner

Date Description
2005-06-14 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms05-025.nasl - Type : ACT_GATHER_INFO
2002-02-13 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms02-005.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:44:44
  • Multiple Updates
2014-01-19 21:29:47
  • Multiple Updates