Summary |
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. |
oval
via4
|
accepted | 2014-02-24T04:00:08.969-05:00 | class | vulnerability | contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | cript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. | family | windows | id | oval:org.mitre.oval:def:1133 | status | accepted | submitted | 2004-07-30T12:00:00.000-04:00 | title | Scob and Toofer Internet Explorer v6.0,SP1 Vulnerabilities | version | 68 |
accepted | 2014-02-24T04:00:31.742-05:00 | class | vulnerability | contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Harvey Rubinovitz | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. | family | windows | id | oval:org.mitre.oval:def:207 | status | accepted | submitted | 2004-07-30T12:00:00.000-04:00 | title | Scob and Toofer Internet Explorer v6.0,SP1 for Server 2003 Vulnerabilities | version | 69 |
accepted | 2014-02-24T04:03:12.690-05:00 | class | vulnerability | contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. | family | windows | id | oval:org.mitre.oval:def:241 | status | accepted | submitted | 2004-07-30T12:00:00.000-04:00 | title | Scob and Toofer Internet Explorer v5.5,SP2 Vulnerabilities | version | 66 |
accepted | 2014-02-24T04:03:21.607-05:00 | class | vulnerability | contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. | family | windows | id | oval:org.mitre.oval:def:519 | status | accepted | submitted | 2004-07-30T04:00:00.000-04:00 | title | Scob and Toofer Internet Explorer v6.0 Vulnerabilities | version | 67 |
|