Vulnerability Note VU#252764
Microsoft Internet Explorer source element cross-domain vulnerability
Microsoft Internet Explorer fails to properly handle redirects for source elements. This can allow a remote attacker to execute arbitrary code on a vulnerable system.
The Cross-Domain Security Model
IE uses a cross-domain security model to maintain separation between browser frames from different sources. This model is designed to prevent code in one domain from accessing data in a different domain. The Internet Security Manager Object determines which zone or domain a URL exists in and what actions can be performed. From Microsoft Security Bulletin MS03-048:
Microsoft Internet Explorer is vulnerable to a cross-domain violation. When a source element is used in combination with a redirect, a web site in one domain has the ability to access information in another domain or zone.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker may be able to execute script in the Local Machine Zone. Script that executes in the Local Machine Zone can be used to download and execute arbitrary code. An attacker may obtain full access to web content in another domain, which may reside in a different security zone. The impact is similar to that of a cross-site scripting vulnerability. This includes the ability to spoof or modify web content, access website information such as cookies, or retrieve data from an encrypted HTTPS connection. For a more detailed description of the impact of cross-site scripting vulnerabilities, please see CERT Advisory CA-2000-02.
Apply an update
Disable Active Scripting
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||09 Aug 2006|
CVSS Metrics (Learn More)
This vulnerability was reported by Microsoft.
This document was written by Will Dormann.
- CVE IDs: CVE-2006-3639
- Date Public: 08 Aug 2006
- Date First Published: 08 Aug 2006
- Date Last Updated: 05 Oct 2006
- Severity Metric: 16.20
- Document Revision: 2
If you have feedback, comments, or additional information about this vulnerability, please send us email.