[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-3896Date: (C)2007-10-10   (M)2023-12-22


The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1018822
SECTRACK-1018831
http://marc.info/?l=bugtraq&m=119143780202107&w=2
http://marc.info/?l=bugtraq&m=119144449915918&w=2
http://www.securityfocus.com/archive/1/481505/100/0/threaded
http://www.securityfocus.com/archive/1/481493/100/100/threaded
http://www.securityfocus.com/archive/1/481624/100/0/threaded
http://marc.info/?l=full-disclosure&m=119159477404263&w=2
http://marc.info/?l=full-disclosure&m=119170531020020&w=2
http://www.securityfocus.com/archive/1/481664/100/0/threaded
http://www.securityfocus.com/archive/1/481671/100/0/threaded
http://www.securityfocus.com/archive/1/481680/100/0/threaded
http://www.securityfocus.com/archive/1/481881/100/0/threaded
http://marc.info/?l=full-disclosure&m=119180333805950&w=2
http://marc.info/?l=bugtraq&m=119195904813505&w=2
http://www.securityfocus.com/archive/1/481846/100/0/threaded
http://www.securityfocus.com/archive/1/481839/100/0/threaded
http://www.securityfocus.com/archive/1/481887/100/0/threaded
http://www.securityfocus.com/archive/1/481867/100/0/threaded
http://www.securityfocus.com/archive/1/481871/100/0/threaded
http://marc.info/?l=bugtraq&m=119194714125580&w=2
http://www.securityfocus.com/archive/1/482090/100/0/threaded
http://www.securityfocus.com/archive/1/482292/100/0/threaded
http://www.securityfocus.com/archive/1/482437/100/0/threaded
BID-25945
SECUNIA-26201
MSKB-943521
HPSBST02291
MS07-061
TA07-317A
VU#403150
http://blogs.zdnet.com/security/?p=577
http://www.heise-security.co.uk/news/96982
http://xs-sniper.com/blog/remote-command-exec-firefox-2005/
oval:org.mitre.oval:def:4581

CPE    7
cpe:/o:microsoft:windows_2003_server::sp2:itanium
cpe:/o:microsoft:windows_2003_server::sp2
cpe:/o:microsoft:windows_xp::sp2:x64
cpe:/o:microsoft:windows_2003_server::sp2:x64
...
CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:4581

© SecPod Technologies