Vulnerability Note VU#713878
Microsoft Internet Explorer does not properly validate source of redirected frame
Overview
Microsoft Internet Explorer (IE) does not adequately validate the security context of a frame that has been redirected by a web server. An attacker could exploit this vulnerability to evaluate script in different security domains. By causing script to be evaluated in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE.
Description
The Cross-Domain Security Model IE uses a cross-domain security model to maintain separation between browser frames from different sources. This model is designed to prevent code in one domain from accessing data in a different domain. The Local Machine Zone is "...an implicit zone for content that exists on the local computer. The content found on the user's computer, except for content that Internet Explorer caches on the local system, is treated with a high level of trust." The determination of what zone and/or domain a URL exists in and what actions can be performed in that zone is made by the Internet Security Manager Object. HTTP/1.1 302 Object moved Note that this vulnerability does not rely on the use of ITS protocol handlers or CHM files. The Location field can be set to any local HTML resource. |
Impact
By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE. |
Solution
Apply a patch |
There are a number of significant vulnerabilities in technologies related to the IE domain/zone security model, trust in and access to the local file system (Local Machine Zone), the Dynamic HTML (DHTML) document object model (in particular, proprietary DHTML features), the HTML Help system, MIME type determination, the graphical user interface (GUI), and ActiveX. These technologies are implemented as operating system components that are used by IE and many other programs to provide web browser functionality. These components are integrated into Windows to such an extent that vulnerabilities in IE frequently provide an attacker significant access to the operating system. |
Systems Affected (Learn More)
| Vendor | Status | Date Notified | Date Updated |
|---|---|---|---|
| Microsoft Corporation | Affected | 10 Jun 2004 | 13 Oct 2004 |
CVSS Metrics (Learn More)
| Group | Score | Vector |
|---|---|---|
| Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| Temporal | 6.5 | E:H/RL:OF/RC:C |
| Environmental | 6.5 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- http://www.us-cert.gov/cas/techalerts/TA04-163A.html
- http://www.us-cert.gov/cas/techalerts/TA04-184A.html
- http://www.us-cert.gov/cas/techalerts/TA04-212A.html
- http://www.cert.org/tech_tips/securing_browser/#Internet_Explorer
- http://www.cert.org/tech_tips/malicious_code_FAQ.html#ie56
- http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx
- http://62.131.86.111/analysis.htm
- http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0104.html
- http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0031.html
- http://secunia.com/advisories/11793/
- http://www.microsoft.com/technet/prodtechnol/winxppro/sp2preview.mspx
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/execscript.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/showmodaldialog.asp
- http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx
- http://www.microsoft.com/security/incident/settings.mspx
- http://support.microsoft.com/?scid=833633
- http://support.microsoft.com/?kbid=182569
- http://support.microsoft.com/?kbid=871260
- http://support.microsoft.com/?kbid=315933
- http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2brows.mspx#EHAA
- http://www.microsoft.com/security/incident/download_ject.mspx
- http://isc.sans.org/diary.php?date=2004-06-25
- http://www.securityfocus.com/bid/10473
- http://xforce.iss.net/xforce/xfdb/16361
Credit
Public incidents related to this vulnerability were reported by Rafel Ivgi. Thanks to Jelmer for further research and analysis.
This document was written by Art Manion.
Other Information
- CVE IDs: CVE-2004-0549
- Date Public: 03 Jun 2004
- Date First Published: 09 Jun 2004
- Date Last Updated: 23 Jul 2012
- Severity Metric: 64.80
- Document Revision: 85
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.