Vulnerability Note VU#326549
Microsoft Windows MHTML script injection vulnerability
Microsoft Windows contains an script injection vulnerability in the MHTML protocol handler, which may allow an attacker to execute arbitrary script within the context of another website domain.
Microsoft Windows contains a script injection vulnerability caused by the way MHTML interprets MIME-formatted requests for content blocks within a document. According to Microsoft TechNet Security Research & Defense blog: "It is possible under certain conditions for this vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim's Internet Explorer. The script could spoof content, disclose information, or take any action that the user could take on the affected Web site on behalf of the targeted user."
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker may be able to obtain access to web content in another domain. The impact is similar to that of a cross-site scripting vulnerability. For a more detailed description of the impact of cross-site scripting vulnerabilities, please see CERT Advisory CA-2000-02.
Apply an update
Lock down the MHTML protocol handler
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||12 Apr 2011|
CVSS Metrics (Learn More)
Thanks to Microsoft Security Response Center for reporting this vulnerability.
This document was written by Michael Orlando.
- CVE IDs: CVE-2011-0096
- Date Public: 28 Jan 2011
- Date First Published: 28 Jan 2011
- Date Last Updated: 12 Apr 2011
- Severity Metric: 11.75
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.