Vulnerability Note VU#626395
Microsoft Internet Explorer Permits Remote Command Execution Through <OBJECT> Tag
Microsoft Internet Explorer (IE) permits the remote execution of arbitrary commands via the <OBJECT> tag.
A vulnerability exists in the way that Microsoft Internet Explorer (IE) handles <OBJECT> tags. If the CLASSID (CLSID) is unrecognized, then Internet Explorer will execute arbitrary commands specified through the CODEBASE property with a local path and filename. This allows an attacker to execute any command that is already present on the victim's machine.
An attacker could create an HTML web page that includes an <OBJECT> tag to a local program on the victim's machine. When a victim using IE visits the malicious site, the commands specified will be executed. In conjunction with scripting, or other vulnerabilities, an attacker can execute multiple commands in sequence.
An attacker can execute arbitrary commands on the system with the privileges of the current user. It should be noted that arguments cannot be specifed to the command(s) being executed. This limits the effectiveness of this vulnerability on default installations of Microsoft Windows.
Apply the patch referenced in MS02-047 or a more recent cumulative patch.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||22 Feb 2002||02 May 2003|
CVSS Metrics (Learn More)
Our thanks to "The Pull" and others for reporting this vulnerability.
This document was written by Jason Rafail.
- CVE IDs: CAN-2002-0077
- Date Public: 13 Jan 2002
- Date First Published: 29 Mar 2002
- Date Last Updated: 08 May 2003
- Severity Metric: 29.69
- Document Revision: 21
If you have feedback, comments, or additional information about this vulnerability, please send us email.