Vulnerability Note VU#326549

Microsoft Windows MHTML script injection vulnerability

Original Release date: 28 Jan 2011 | Last revised: 12 Apr 2011


Microsoft Windows contains an script injection vulnerability in the MHTML protocol handler, which may allow an attacker to execute arbitrary script within the context of another website domain.


Microsoft Windows contains a script injection vulnerability caused by the way MHTML interprets MIME-formatted requests for content blocks within a document. According to Microsoft TechNet Security Research & Defense blog: "It is possible under certain conditions for this vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim's Internet Explorer. The script could spoof content, disclose information, or take any action that the user could take on the affected Web site on behalf of the targeted user."


By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker may be able to obtain access to web content in another domain. The impact is similar to that of a cross-site scripting vulnerability. For a more detailed description of the impact of cross-site scripting vulnerabilities, please see CERT Advisory CA-2000-02.


Apply an update

This issue is addressed in Microsoft Security Bulletin MS11-026.

Lock down the MHTML protocol handler

Microsoft TechNet Security Research & Defense blog has released Microsoft Fix it 50602 to help mitigate this vulnerability.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-12 Apr 2011
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Microsoft Security Response Center for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2011-0096
  • Date Public: 28 Jan 2011
  • Date First Published: 28 Jan 2011
  • Date Last Updated: 12 Apr 2011
  • Severity Metric: 11.75
  • Document Revision: 17


If you have feedback, comments, or additional information about this vulnerability, please send us email.