Overview
Microsoft Internet Explorer (IE) does not adequately validate the security context of a frame that has been redirected by a web server. An attacker could exploit this vulnerability to evaluate script in different security domains. By causing script to be evaluated in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE.
Description
The Cross-Domain Security Model IE uses a cross-domain security model to maintain separation between browser frames from different sources. This model is designed to prevent code in one domain from accessing data in a different domain. The Local Machine Zone is "...an implicit zone for content that exists on the local computer. The content found on the user's computer, except for content that Internet Explorer caches on the local system, is treated with a high level of trust." The determination of what zone and/or domain a URL exists in and what actions can be performed in that zone is made by the Internet Security Manager Object. HTTP/1.1 302 Object moved Note that this vulnerability does not rely on the use of ITS protocol handlers or CHM files. The Location field can be set to any local HTML resource. |
Impact
By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE. |
Solution
Apply a patch |
There are a number of significant vulnerabilities in technologies related to the IE domain/zone security model, trust in and access to the local file system (Local Machine Zone), the Dynamic HTML (DHTML) document object model (in particular, proprietary DHTML features), the HTML Help system, MIME type determination, the graphical user interface (GUI), and ActiveX. These technologies are implemented as operating system components that are used by IE and many other programs to provide web browser functionality. These components are integrated into Windows to such an extent that vulnerabilities in IE frequently provide an attacker significant access to the operating system. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Temporal | 6.5 | E:H/RL:OF/RC:C |
Environmental | 6.5 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx
- http://62.131.86.111/analysis.htm
- http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0104.html
- http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0031.html
- http://secunia.com/advisories/11793/
- http://www.microsoft.com/technet/prodtechnol/winxppro/sp2preview.mspx
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/execscript.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/showmodaldialog.asp
- http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx
- http://www.microsoft.com/security/incident/settings.mspx
- http://support.microsoft.com/?scid=833633
- http://support.microsoft.com/?kbid=182569
- http://support.microsoft.com/?kbid=871260
- http://support.microsoft.com/?kbid=315933
- http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2brows.mspx#EHAA
- http://www.microsoft.com/security/incident/download_ject.mspx
- http://isc.sans.org/diary.php?date=2004-06-25
- http://www.securityfocus.com/bid/10473
- http://xforce.iss.net/xforce/xfdb/16361
Acknowledgements
Public incidents related to this vulnerability were reported by Rafel Ivgi. Thanks to Jelmer for further research and analysis.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2004-0549 |
Severity Metric: | 64.80 |
Date Public: | 2004-06-03 |
Date First Published: | 2004-06-09 |
Date Last Updated: | 2012-07-23 21:02 UTC |
Document Revision: | 86 |