search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Internet Explorer does not adequately validate window ornament parameters in dialog frames

Vulnerability Note VU#244729

Original Release Date: 2003-05-05 | Last Revised: 2003-05-06


A vulnerability in the way Microsoft Internet Explorer (IE) handles window ornament parameters in dialog frames allows script from a dialog frame in one domain to execute in a different domain, including the Local Machine Zone. The script could read certain local files and data (i.e. cookies) from other web sites. In the presence of other vulnerabilities (VU#626395, VU#25249), the script could execute arbitrary commands.


Microsoft Internet Explorer provides two methods (showModalDialog and showModelessDialog) that can be used to display dialog box frames. Both methods require a URI parameter that specifies the source of the dialog frame's content. The methods may optionally specify "windows ornaments" that control different aspects of the dialog frame's appearance (position, dimensions, font settings, etc.).

A dialog frame is subject to the security restrictions of the DHTML Object Model: script executing in one frame cannot access data in a frame from a different domain or across a different protocol. The dialog methods may specify source URIs in a different domain than the parent frame, however the security restrictions should prevent script in one frame from accessing data in the other.

IE does not adequately validate window ornament parameters in dialog frames. Script included in windows ornament parameters in a dialog frame called from one domain is permitted to access data in a different domain as specified by the dialog frame's source URI.

Internet Explorer, Outlook, Outlook Express, MSN Messenger, Eudora, Lotus Notes, Adobe PhotoDeluxe, AOL, and any other software that hosts the WebBrowser ActiveX control could be affected by this vulnerability.

Further information is available in examples by Thor Larholm (dialog style XSS) and Liu Die Yu (Poisonous Style).


An attacker who is able to convince a user to access a specially crafted HTML document, such as an Internet web page or HTML email message, could read data from a different domain, including the Local Machine Zone. The attacker could read cookies from other web sites and certain types of local files. The attacker's HTML document would need to reside in a zone in which Active scripting was enabled.
In conjunction with other vulnerabilities (VU#626395, VU#25249), the attacker could execute arbitrary commands on the user's system.


Apply Patch
Apply Q813489 or a more recent cumulative patch. See Microsoft Security Bulletin MS03-015 for more information.

Disable Active scripting

Active scripting is required to open a modal dialog frame. At a minimum, disable Active scripting in the Internet zone and the zone used by Outlook, Outlook Express, or any other email client that uses Internet Explorer or the WebBrowser control to render HTML. Instructions for disabling Active scripting can be found in the CERT/CC Malicious Web Scripts FAQ.

Apply the Outlook Email Security Update

Another way to effectively disable Active scripting in Outlook is to install the Outlook Email Security Update. The update configures Outlook to open email messages in the Restricted Sites Zone, where Active scripting is disabled by default. In addition, the update provides further protection against malicious code that attempts to propagate via Outlook. The Outlook Email Security Update is available for Outlook 98 and Outlook 2000. The functionality of the Outlook Email Security Update is included in Outlook 2002 and Outlook Express 6.

Update HTML Help

To protect against arbitrary command execution, install an updated version of HTML Help (811630). As described in Microsoft Security Bulletin MS03-015, the updated HHCtrl ActiveX control disables the Shortcut command in a compiled help file that has been opened with the showHelp method:

    • Only supported protocols [http:, https:, file:, ftp:, ms-its:, or mk:@MSITStore:] can be used with showHelp to open a web page or help (chm) file.
    • The shortcut function supported by HTML Help will be disabled when the help file is opened with showHelp This will not affect the shortcut functionality if the same CHM file is opened by the user manually by double-clicking on the help file, or by through an application on the local system using the HTMLHELP( ) API.
Note that the patches referenced in MS03-004 and MS03-015 completely disable the showHelp method. After installing either one of these patches, Internet Explorer will not be able to open help files.

Restrict HTML Help commands

Restrict the execution of the Shortcut and WinHelp HTML Help commands to specified folders, or disable the commands entirely. As in the previous recommendation, this technique will protect against arbitrary command execution via HTML Help. Details are available in Microsoft Knowledge Base Article 810687.

Vendor Information


Microsoft Corporation Affected

Updated:  May 05, 2003



Vendor Statement

Please see Microsoft Security Bulletin MS03-015.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This vulnerability was publicly reported by Liu Die Yu.

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2003-0116
Severity Metric: 16.73
Date Public: 2002-12-03
Date First Published: 2003-05-05
Date Last Updated: 2003-05-06 20:24 UTC
Document Revision: 31

Sponsored by CISA.