Vulnerability Note VU#443699
Microsoft Internet Explorer Does Not Respect Content-Disposition and Content-Type MIME Headers
Microsoft Internet Explorer contains a vulnerability in its handling of certain MIME headers in web pages and HTML email messages. This vulnerability may allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message.
Web pages and HTML email messages usually contain HTML text, but other files may also be included. The MIME headers Content-Disposition and Content-Type provide the information needed by the HTML rendering software to determine the type of these files. In Microsoft Internet Explorer, these MIME headers are consulted when evaluating whether to process an embedded file, but they are ignored when the file is actually processed.
For example, if an executable (.exe) file is embedded with MIME headers that misrepresent it as a JPEG image file (.jpg), Internet Explorer will treat the file as a JPEG when evaluating whether it is safe to open. Once this evaluation is complete, the file will be opened according to its .exe file extension and will be executed on the local system.
By convincing a user to view a malicious web page or HTML email message, a remote attacker can cause the user to execute arbitrary code. Any such code would run with the privileges of the user who attempted to view the content.
Apply a patch from your vendor
Disable file downloads in untrusted security zones
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||20 Dec 2001|
CVSS Metrics (Learn More)
- This issue is different than the one reported in CA-2001-06
Microsoft has publicly acknowledged Jouko Pynnonen of Oy Online Solutions Ltd as the reporter of this vulnerability.
This document was written by Cory F. Cohen and Jeffrey P. Lanza.
- CVE IDs: CAN-2001-0727
- CERT Advisory: CA-2001-36
- Date Public: 13 Dec 2001
- Date First Published: 14 Dec 2001
- Date Last Updated: 07 Jun 2002
- Severity Metric: 50.63
- Document Revision: 21
If you have feedback, comments, or additional information about this vulnerability, please send us email.