Vulnerability Name: | CCN-8667 | ||||||
Published: | 2002-03-28 | ||||||
Updated: | 2002-03-28 | ||||||
Summary: | Microsoft Internet Explorer and Outlook could allow the execution of arbitrary files that are embedded within Temporary Internet Files (TIFs). A remote attacker could create a specially-crafted HTML email, newsgroup posting, or Web page that uses base64 encoding and the "Content-Type:" and "Content-Location:" headers to specify malicious files to be stored within TIFs, which could be executed using a Windows Media Player file or another file type that the victim can be tricked into opening, if the exact location of the files could be determined. | ||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Mar 28 2002 - 01:37:58 CST HELP.dropper: IE6, OE6, Outlook...lookOut Source: CCN Type: BugTraq Mailing List, Fri Mar 29 2002 - 02:42:38 CST Outlook Express Attach Execution Exploit (img tag + innerHTML + TIF dos name) Source: CCN Type: BID-4387 Microsoft Temporary Internet File Execution Vulnerability Source: XF Type: UNKNOWN ms-tif-execute-files(8667) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |