[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-3670Date: (C)2007-07-10   (M)2023-12-22


Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECTRACK-1018351
SECTRACK-1018360
http://www.securityfocus.com/archive/1/473276/100/0/threaded
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565
BID-24837
SECUNIA-25984
SECUNIA-26096
SECUNIA-26149
SECUNIA-26204
SECUNIA-26216
SECUNIA-26258
SECUNIA-26271
SECUNIA-26572
SECUNIA-28179
SECUNIA-28363
OSVDB-38017
ADV-2007-2473
ADV-2007-2565
ADV-2007-4272
ADV-2008-0082
HPSBUX02153
HPSBUX02156
MDKSA-2007:152
SUSE-SA:2007:049
TA07-199A
USN-503-1
VU#358017
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt
http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/
http://larholm.com/2007/07/10/internet-explorer-0day-exploit/
http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx
http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html
http://www.mozilla.org/security/announce/2007/mfsa2007-23.html
http://www.mozilla.org/security/announce/2007/mfsa2007-40.html
http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/
http://www.virusbtn.com/news/virus_news/2007/07_11.xml
http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html
ie-firefoxurl-command-execution(35346)

CPE    3
cpe:/a:microsoft:internet_explorer:6
cpe:/a:microsoft:internet_explorer:6:sp1
cpe:/a:mozilla:firefox
CWE    1
CWE-79

© SecPod Technologies