Executive Summary
Summary | |
---|---|
Title | Microsoft Windows "MHTML" protocol handler fails to properly handle URL redirections |
Informations | |||
---|---|---|---|
Name | VU#783761 | First vendor Publication | 2007-06-13 |
Vendor | VU-CERT | Last vendor Modification | 2007-06-21 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#783761Microsoft Windows "MHTML" protocol handler fails to properly handle URL redirectionsOverviewMicrosoft Windows "MHTML" protocol handler fails to properly interpret URL redirections, which may cause information disclosure.I. DescriptionThe Microsoft Windows "MHTML" protocol handler contains an information disclosure vulnerability in the way that it interprets URL redirections. The "MHTML" protocol handler fails to properly interpret HTTP server-side redirect through the "MHTML" protocol, which may allow Internet Explorer to bypass Internet Explorer domain restrictions.II. ImpactBy convincing a user to visit a specially crafted website, a remote, unauthenticated attacker may be able to access sensitive information.III. SolutionApply an updateThis issue is addressed by Microsoft Security Bulletin MS07-034.
1. Click Start and then click Run. Enter regedit.exe in the text box and click OK. 2. Navigate to HKEY_CLASSES_ROOTCLSID{05300401-BCBC-11d0-85E3-00C04FD85AB4}. 3. Right click {05300401-BCBC-11d0-85E3-00C04FD85AB4} and select Permissions. 4. Click Advanced. 5. Uncheck Allow inheritable permissions from the parent to propagate… 6. Click Remove, and then click OK. Click Yes and OKon subsequent screens. Impact of workaround: This workaround disables page rendering for MHTML Web pages. Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. 1. In Internet Explorer, click Internet Options on the Tools menu. 2. Click the Security tab. 3. Click Internet, and then click Custom Level. 4. Under Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK. 5. Click Local intranet, and then click Custom Level. 6. Under Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK. 7. Click OK two times to return to Internet Explorer. Please see Microsoft Security Bulletin MS07-034 for further details. Systems Affected
References
This vulnerability was reported in Microsoft Security Bulletin MS07-034. This document was written by Katie Steiner
|
Original Source
Url : http://www.kb.cert.org/vuls/id/783761 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1605 | |||
Oval ID: | oval:org.mitre.oval:def:1605 | ||
Title: | URL Redirect Cross Domain Information Disclosure Vulnerability | ||
Description: | A component in Microsoft Outlook Express 6 allows remote attackers to bypass domain restrictions and obtain sensitive information via redirections with the mhtml: URI handler, as originally reported for Internet Explorer 6 and 7, aka "URL Redirect Cross Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2111 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Outlook Express |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2011-01-14 | Name : Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosu... File : nvt/gb_ms07-034.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
25073 | Microsoft IE mhtml: Redirection Domain Restriction Bypass Internet Explorer contains a flaw that may allow a malicious user to access documents served from another web site. The issue is caused due to an error in the handling of redirections for URLs with the "mhtml:" URI handler. It is possible that the flaw may allow a malicious website to access properties of a site in an arbitrary external domain in the context of the victim user's browser resulting in a loss of confidentiality. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-06-12 | Name : Arbitrary code can be executed on the remote host through the email client. File : smb_nt_ms07-034.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-05-08 13:28:08 |
|
2013-05-11 12:26:44 |
|