[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Folder GUID Code Execution Vulnerability

ID: oval:org.mitre.oval:def:318Date: (C)2006-08-11   (M)2022-03-21
Class: VULNERABILITYFamily: windows




Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (\\\%2e\\\%2e\\\%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear.

Platform:
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Reference:
CVE-2006-3281
CVE    1
CVE-2006-3281
CPE    5
cpe:/o:microsoft:windows_xp::sp1:x86
cpe:/o:microsoft:windows_2000::sp4
cpe:/o:microsoft:windows_xp::sp1:64bit
cpe:/o:microsoft:windows_xp
...

© SecPod Technologies