CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
EPSS
Percentile
90.6%
The Microsoft XMLHTTP ActiveX control allows unauthorized reading of any known file on a system. A victim must be enticed to visit a malicious site in order to be attacked.
Description (from MS02-008):
Microsoft XML Core Services (MSXML) includes the XMLHTTP ActiveX control, which allows web pages rendering in the browser to send or receive XML data via HTTP operations such as POST, GET, and PUT. The control provides security measures designed to restrict web pages so they can only use the control to request data from remote data sources.
A flaw exists in how the XMLHTTP control applies IE security zone settings to a redirected data stream returned in response to a request for data from a web site. A vulnerability results because an attacker could seek to exploit this flaw and specify a data source that is on the user's local system. The attacker could then use this to return information from the local system to the attacker's web site.
Preconditions (from MS02-008):
- The vulnerability can only be exploited via a web site. It would not be possible to exploit this vulnerability via HTML mail.
- The attacker would need to know the full path and file name of a file in order to read it.
A remote attacker who can entice a victim to visit a malicious web site can read any file the user can. Note this vulnerability is not believed to allow file modification (no file writing, inserting, or deleting).
Apply the patches found in MS02-008.
<http://www.microsoft.com/windows/ie/downloads/critical/q317244/download.asp>
Microsoft has confirmed that this problem could result in some degree of security vulnerability in Microsoft XML 4.0. This problem was corrected in Microsoft XML 4.0 Service Pack 1.
To download MSXML 4.0 Service Pack 1, visit the following Microsoft Web site:
MSXML can also be installed separately. MSXML is installed as a DLL in the System32 subfolder of the Windows operating system folder. On most systems, this will likely be C:\Windows
or C:\winnt
. If you have any or all of the following files in the System32
folder, you need the patch:
* `Msxml2.dll `
* `Msxml3.dll `
* `Msxml4.dll `
Msxml.dll
, you do not need the patch because this is an earlier, unaffected version.328163
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: October 02, 2002
Affected
Please see MS02-008:
<http://www.microsoft.com/technet/security/bulletin/ms02-008.asp>
The vendor has not provided us with any further information regarding this vulnerability.
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------- Title: XMLHTTP Control Can Allow Access to Local Files Date: 21 February 2002 Software: Microsoft XML Core Services Impact: Information disclosure Max Risk: Critical Bulletin: MS02-008
`Microsoft encourages customers to review the Security Bulletin at:
<http://www.microsoft.com/technet/security/bulletin/MS02-008.asp>
.
Issue:
A flaw exists in how the XMLHTTP control applies IE security zone
An attacker would have to entice the user to a site under his
Mitigating Factors:
- The attacker would need to know the full path and file name
- The vulnerability does not provide any ability to add,
Risk Rating:
Patch Availability:<http://www.microsoft.com/technet/security/bulletin/ms02-008.asp>
- ---------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
-----BEGIN PGP SIGNATURE-----
iQEVAwUBPHWQL40ZSRQxA/UrAQEbFwf+IpIT14BtaOo2dJfsDKfs/257rCbbfLDj*******************************************************************
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23328163 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This document was written by Jeffrey S. Havrilla based on information provided by Microsoft.
CVE IDs: | CVE-2002-0057 |
---|---|
Severity Metric: | 10.40 Date Public: |