[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-3896

Date: (C)2007-10-10   (M)2017-10-04
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.

Reference:
SECTRACK-1018822
SECTRACK-1018831
http://marc.info/?l=bugtraq&m=119143780202107&w=2
http://marc.info/?l=bugtraq&m=119144449915918&w=2
http://www.securityfocus.com/archive/1/archive/1/481505/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481493/100/100/threaded
http://www.securityfocus.com/archive/1/archive/1/481624/100/0/threaded
http://marc.info/?l=full-disclosure&m=119159477404263&w=2
http://marc.info/?l=full-disclosure&m=119171444628628&w=2
http://www.securityfocus.com/archive/1/archive/1/481664/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481671/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481680/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481881/100/0/threaded
http://marc.info/?l=full-disclosure&m=119180333805950&w=2
http://marc.info/?l=bugtraq&m=119195904813505&w=2
http://www.securityfocus.com/archive/1/archive/1/481846/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481839/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481887/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481867/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/481871/100/0/threaded
http://marc.info/?l=bugtraq&m=119194714125580&w=2
http://www.securityfocus.com/archive/1/archive/1/482090/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/482292/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/482437/100/0/threaded
BID-25945
SECUNIA-26201
MSKB-943521
HPSBST02291
IAVM:2007-A-0053
MS07-061
SSRT071498
TA07-317A
VU#403150
http://blogs.zdnet.com/security/?p=577
http://www.heise-security.co.uk/news/96982
http://xs-sniper.com/blog/remote-command-exec-firefox-2005/

CPE    1
cpe:/a:microsoft:ie:7.0
CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:4581

© 2013 SecPod Technologies