Overview
The Outlook Express MIME Encapsulation of Aggregate HTML Documents (MHTML) protocol handler does not adequately validate the source of alternate content. An attacker could exploit this vulnerability to access data and execute script in different security domains. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running the program that invoked the handler, typically Internet Explorer (IE).
Description
The Cross Domain Security Model IE uses a cross-domain security model to maintain separation between browser frames from different sources. This model is designed to prevent code in one domain from accessing data in a different domain. The Local Machine Zone is "...an implicit zone for content that exists on the local computer. The content found on the user's computer, except for content that Internet Explorer caches on the local system, is treated with a high level of trust." The determination of what zone and/or domain a URL exists in and what actions can be performed in that zone is made by the Internet Security Manager Object. ms-its:http://www.example.com/directory/path/compiledhelpfile.chm:/htmlfile.html This URL references a local CHM file: its:file://c:\directory\path\compiledhelpfile.chm:/htmlfile.html MIME Encapsulation of Aggregate HTML Documents (MHTML) ms-its:mhtml:file://c:\directory\path\mhtmlfile.mhtml The ITS protocol handlers can specify an alternate location for MHTML content (URL is wrapped): ms-its:mhtml:file://c:\file_does_not_exist.mhtml!http://www.example.com/directory/ The Problem |
Impact
By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE. The attacker could also read or modify data in other web sites and in the Local Machine Zone (read cookies/content, modify/create content, etc.). |
Solution
Install a patch |
Disabling the ITS and MHTML protocol handlers may prevent exploitation of this vulnerability. Delete or rename the following registry keys: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.securityfocus.com/archive/1/345615
- http://www.microsoft.com/technet/security/bulletin/ms04-013.mspx
- http://msdn.microsoft.com/workshop/security/szone/overview/overview.asp
- http://msdn.microsoft.com/workshop/author/om/xframe_scripting_security.asp
- http://msdn.microsoft.com/workshop/networking/moniker/overview/appendix_a.asp
- http://support.microsoft.com/support/kb/articles/Q182/5/69.asp
- http://support.microsoft.com/support/kb/articles/Q174/3/60.asp
- http://msdn.microsoft.com/workshop/security/szone/overview/overview.asp#SecurityZones
- http://msdn.microsoft.com/workshop/security/szone/overview/overview.asp#default_zones
- http://msdn.microsoft.com/workshop/networking/pluggable/pluggable.asp
- http://msdn.microsoft.com/workshop/networking/moniker/monikers.asp
- http://www.microsoft.com/windows/ieak/default.asp
- http://msdn.microsoft.com/library/en-us/htmlhelp/html/vsconHH1Start.asp
- [<a href="http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cdosys/html/ _cdosys_mime_encapsulation_of_aggregate_html_documents_mhtml_.asp">http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cdosys/html/ _cdosys_mime_encapsulation_of_aggregate_html_documents_mhtml_.asp</a>]
- http://msdn.microsoft.com/library/en-us/stg/stg/istorage.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/objects/object.asp
- http://msdn.microsoft.com/workshop/security/szone/reference/objects/internetsecuritymanager.asp
- http://support.microsoft.com/default.aspx?scid=833633
- http://www.ietf.org/rfc/rfc2110.txt
- http://www.ietf.org/rfc/rfc2111.txt
- http://www.dsv.su.se/~jpalme/ietf/mhtml.html
- http://www.helpware.net/htmlhelp/hh_info.htm
- http://www.securityfocus.com/bid/9658
- http://secunia.com/advisories/10523/
- http://www.auscert.org.au/3990
Acknowledgements
This vulnerability was reported by Liu Die Yu. Thanks to http-equiv for additional research and collaboration.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2004-0380 |
Severity Metric: | 76.50 |
Date Public: | 2003-11-25 |
Date First Published: | 2004-04-05 |
Date Last Updated: | 2005-06-17 20:10 UTC |
Document Revision: | 84 |