Microsoft Windows XP – ‘explorer.exe’ Remote Denial of Service

Microsoft Windows XP – ‘explorer.exe’ Remote Denial of Service

漏洞ID 1054412 漏洞类型
发布时间 2004-03-19 更新时间 2004-03-19
图片[1]-Microsoft Windows XP – ‘explorer.exe’ Remote Denial of Service-安全小百科CVE编号 N/A
图片[2]-Microsoft Windows XP – ‘explorer.exe’ Remote Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23850
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9924/info

Microsoft Windows Explorer for Windows XP has been reported to be prone to a remote denial of service vulnerability.

This issue is due to a failure of the application to properly validate user-supplied input via the 'shell:' command. The 'shell:' command is a parameter that a user can specify when including a URI in an HTML tag. This command allows the HTML script to potentially execute any program specified after the 'shell:' command.

Successful exploitation of this issue would cause the affected application to crash, denying service to legitimate users.

The issue may be triggered when a user follows an HTML link formatted like so:
<a href=shell:windows\system32\calc.exe>link</a>

This issue may be triggered when a user views an HTML document containing the following tag:
<iframe src=shell:windows\system32\calc.exe></iframe>

相关推荐: Solaris 8 dtscreen Authentication Bypass Vulnerability

Solaris 8 dtscreen Authentication Bypass Vulnerability 漏洞ID 1101962 漏洞类型 Failure to Handle Exceptional Conditions 发布时间 2002-06-17 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享