Vulnerability Note VU#12746
Microsoft scriptlet.typlib ActiveX object unsafe for scripting from Internet Explorer
The ActiveX control "scriptlet.typlib" is incorrectly marked "safe for scripting" in Internet Explorer (IE) versions 4.0 and 5.0, when it is actually unsafe for scripting.
There exists a vulnerability in the default installation of an ActiveX control named "scriptlet.typlib," used by developers to create type libraries for Windows Script Components. This ActiveX control allows local files to be created or modified and thus is unsafe for scripting by IE. However, it is incorrectly marked "safe for scripting" in IE versions 4.0 and 5.0 for Windows.
Any HTML document rendered in IE may call scriptlet.typlib and, without any warning displayed by IE, create or edit files with all permissions of the client user. Such attacks can occur when visiting unfriendly web sites, or rendering embedded HTML in email, newsgroup postings, or even server log entries.
Install the appropriate patches available at:
Disable ActiveX controls in IE.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft||Affected||21 Aug 2001||17 Nov 2001|
CVSS Metrics (Learn More)
Thanks to Michael Kelfer for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
- CVE IDs: CVE-1999-0668
- Date Public: 21 Aug 99
- Date First Published: 29 Mar 2002
- Date Last Updated: 29 Mar 2002
- Severity Metric: 1.85
- Document Revision: 20
If you have feedback, comments, or additional information about this vulnerability, please send us email.