SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Microsoft Internet Explorer (IE) Vendors:   Microsoft
(Vendor Issues Fix) Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
SecurityTracker Alert ID:  1013113
SecurityTracker URL:  http://securitytracker.com/id/1013113
CVE Reference:   CAN-2004-1319   (Links to External Site)
Date:  Feb 8 2005
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Microsoft Internet Explorer (IE) in the DHTML Edit ActiveX control. A remote user can execute scripting code in arbitrary domains.

Paul from GreyHats Security Group reported that a remote user can create HTML that, when loaded by the target user, will invoke the 'dhtmled.ocx' ActiveX control to inject arbitrary scripting code into a different window on the target user's system.

The HTML can open a window and display the page in the control. The parent HTML window can access scripting functions in the new window via the execScript() function.

A demonstration exploit example is available at:

http://freehost07.websamba.com/greyhats/abusiveparent.htm

Impact:   A remote user can execute arbitrary scripting code in an arbitrary domain on the target user's system.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=AEA07CBA-0E2B-4A22-91ED-1D23BB012C04

Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=9490E7D2-03C2-463A-B3D0-B949F5295208

Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium):

http://www.microsoft.com/downloads/details.aspx?FamilyId=9E0247B8-240E-416C-9586-ACD5EF8578DE

Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium):

http://www.microsoft.com/downloads/details.aspx?FamilyId=2CE98263-2AB4-4FE3-8B0B-5B3155119730

Microsoft Windows Server 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=E99F5BDD-8EA8-4837-960E-0D20DEA9AC4D

Microsoft Windows Server 2003 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=2CE98263-2AB4-4FE3-8B0B-5B3155119730

A restart is required in some cases.

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms05-013.mspx (Links to External Site)
Cause:   Access control error
Underlying OS:   Windows (Me), Windows (98), Windows (2000), Windows (2003), Windows (XP)

Message History:   This archive entry is a follow-up to the message listed below.
Dec 16 2004 Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks



 Source Message Contents

Date:  Tue, 8 Feb 2005 03:54:45 -0500
Subject:  [none]


Microsoft February Update
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC