Vulnerability Note VU#12746

Microsoft scriptlet.typlib ActiveX object unsafe for scripting from Internet Explorer

Original Release date: 29 Mar 2002 | Last revised: 29 Mar 2002


The ActiveX control "scriptlet.typlib" is incorrectly marked "safe for scripting" in Internet Explorer (IE) versions 4.0 and 5.0, when it is actually unsafe for scripting.


There exists a vulnerability in the default installation of an ActiveX control named "scriptlet.typlib," used by developers to create type libraries for Windows Script Components. This ActiveX control allows local files to be created or modified and thus is unsafe for scripting by IE. However, it is incorrectly marked "safe for scripting" in IE versions 4.0 and 5.0 for Windows.


Any HTML document rendered in IE may call scriptlet.typlib and, without any warning displayed by IE, create or edit files with all permissions of the client user. Such attacks can occur when visiting unfriendly web sites, or rendering embedded HTML in email, newsgroup postings, or even server log entries.


Install the appropriate patches available at:

Disable ActiveX controls in IE.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MicrosoftAffected21 Aug 200117 Nov 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Michael Kelfer for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

  • CVE IDs: CVE-1999-0668
  • Date Public: 21 Aug 99
  • Date First Published: 29 Mar 2002
  • Date Last Updated: 29 Mar 2002
  • Severity Metric: 1.85
  • Document Revision: 20


If you have feedback, comments, or additional information about this vulnerability, please send us email.