Microsoft Internet Explorer 6 – mms Protocol Handler Executable Command Line Injection

Microsoft Internet Explorer 6 – mms Protocol Handler Executable Command Line Injection

漏洞ID 1054551 漏洞类型
发布时间 2004-08-05 更新时间 2004-08-05
图片[1]-Microsoft Internet Explorer 6 – mms Protocol Handler Executable Command Line Injection-安全小百科CVE编号 N/A
图片[2]-Microsoft Internet Explorer 6 – mms Protocol Handler Executable Command Line Injection-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24354
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/10879/info

A vulnerability has been reported to exist in Microsoft Internet Explorer that may allow remote attackers to pass arbitrary command line arguments to an application associated with the mms: URI protocol handler. Windows Media Player is the application normally associated with this URI protocol handler. 

This vulnerability would permit an attacker to influence the invocation arguments for the executable and could result in loss of compromise of various security properties. This may be exploited from a malicious Web page or possibly through HTML email.

It is not known if this issue is specific to the mms: URI protocol handler or if other URI protocol handlers on the system may be similarly affected. This vulnerability could be a general issue in Internet Explorer with many possible attack vectors, although there is not enough information available at this time to make this determination.

<A HREF=mms:\."%20/layout%20c>TRY IT</A>

相关推荐: Invision Power Board Index.PHP SQL Injection Vulnerability

Invision Power Board Index.PHP SQL Injection Vulnerability 漏洞ID 1099085 漏洞类型 Input Validation Error 发布时间 2003-12-16 更新时间 2003-12-1…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享