Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title Microsoft Windows Vista Feed Headlines Gadget vulnerability
Name VU#558648 First vendor Publication 2007-08-15
Vendor VU-CERT Last vendor Modification 2007-08-15
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#558648

Microsoft Windows Vista Feed Headlines Gadget vulnerability


The Windows Vista Feed Headlines gadget contains a vulnerability that may allow and attacker to execute code.

I. Description

From Microsoft Security Bulletin MS07-048:

    Gadgets are mini-applications designed to provide the user with information or utilities. Windows Vista treats gadgets similar to the way Windows Vista treats other executable code. Gadgets are written using HTML and script, but this HTML is not located on an arbitrary remote server as web pages are. HTML content in the Gadget is downloaded first as part of a package of resources and configuration files and then executed from the local computer. This download process is similar to applications (.exe files) downloaded from the Internet.

The Windows Vista Feed headlines gadget contains a vulnerability that occurs because the gadget does not properly parse HTML attributes. To exploit this vulnerability, an attacker would need to convince a user to subscribe to a malicious RSS feed using the Vista Feed headlines gadget.

II. Impact

A remote, unauthenticated attacker may be able to execute arbitrary code, or create a denial-of-service condition.

III. Solution


Microsoft has released update MS07-048 to address this issue.

Disable the Feed headlines gadget

Until updates can be applied, disabling the Feed headlines gadget will mitigate this vulnerability. To disable the Feed headlines gadget, see the workarounds section of Microsoft Security Bulletin MS07-048.

Systems Affected

VendorStatusDate Updated
Microsoft CorporationVulnerable15-Aug-2007




Thanks to Microsoft for information that was used in this report. Microsoft credits Aviv Raff for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

Date Public08/14/2007
Date First Published08/15/2007 05:44:29 AM
Date Last Updated08/15/2007
CERT Advisory 
CVE NameCVE-2007-3033
Document Revision11

Original Source

Url : http://www.kb.cert.org/vuls/id/558648

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:2152
Oval ID: oval:org.mitre.oval:def:2152
Title: Vulnerability in Feed Headline Gadget.
Family: windows Class: vulnerability
Reference(s): CVE-2007-3033
Version: 5
Platform(s): Microsoft Windows Vista
Definition Synopsis:

CPE : Common Platform Enumeration

Os 2

Open Source Vulnerability Database (OSVDB)

Id Description
36391 Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS

Information Assurance Vulnerability Management (IAVM)

Date Description
2007-08-16 IAVM : 2007-T-0032 - Windows Vista Gadgets Remote Code Execution Vulnerabilities
Severity : Category II - VMSKEY : V0014837

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows Vista feed headlines cross-site scripting attack attempt
RuleID : 19174 - Revision : 15 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows Vista Feed Headlines Gagdet code execution attempt
RuleID : 15946 - Revision : 13 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2007-08-16 Name : Arbitrary code can be executed on the remote host through Desktop Gadgets.
File : smb_nt_ms07-048.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2016-04-26 18:27:15
  • Multiple Updates
2015-05-08 13:28:05
  • Multiple Updates
2013-05-11 12:26:39
  • Multiple Updates