CVE-2007-3896

The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.
References
Link Resource
http://blogs.zdnet.com/security/?p=577
http://marc.info/?l=bugtraq&m=119143780202107&w=2
http://marc.info/?l=bugtraq&m=119144449915918&w=2
http://marc.info/?l=bugtraq&m=119159924712561&w=2
http://marc.info/?l=bugtraq&m=119168062128026&w=2
http://marc.info/?l=bugtraq&m=119194714125580&w=2
http://marc.info/?l=bugtraq&m=119195904813505&w=2
http://marc.info/?l=full-disclosure&m=119159477404263&w=2
http://marc.info/?l=full-disclosure&m=119168727402084&w=2
http://marc.info/?l=full-disclosure&m=119170531020020&w=2
http://marc.info/?l=full-disclosure&m=119171444628628&w=2
http://marc.info/?l=full-disclosure&m=119175323322021&w=2
http://marc.info/?l=full-disclosure&m=119180333805950&w=2
http://secunia.com/advisories/26201 Vendor Advisory
http://securitytracker.com/id?1018831
http://www.heise-security.co.uk/news/96982
http://www.kb.cert.org/vuls/id/403150 US Government Resource
http://www.microsoft.com/technet/security/advisory/943521.mspx
http://www.securityfocus.com/archive/1/481493/100/100/threaded
http://www.securityfocus.com/archive/1/481505/100/0/threaded
http://www.securityfocus.com/archive/1/481624/100/0/threaded
http://www.securityfocus.com/archive/1/481664/100/0/threaded
http://www.securityfocus.com/archive/1/481671/100/0/threaded
http://www.securityfocus.com/archive/1/481680/100/0/threaded
http://www.securityfocus.com/archive/1/481839/100/0/threaded
http://www.securityfocus.com/archive/1/481846/100/0/threaded
http://www.securityfocus.com/archive/1/481867/100/0/threaded
http://www.securityfocus.com/archive/1/481871/100/0/threaded
http://www.securityfocus.com/archive/1/481881/100/0/threaded
http://www.securityfocus.com/archive/1/481887/100/0/threaded
http://www.securityfocus.com/archive/1/482090/100/0/threaded
http://www.securityfocus.com/archive/1/482292/100/0/threaded
http://www.securityfocus.com/archive/1/482437/100/0/threaded
http://www.securityfocus.com/archive/1/484186/100/0/threaded
http://www.securityfocus.com/archive/1/484186/100/0/threaded
http://www.securityfocus.com/bid/25945
http://www.securitytracker.com/id?1018822
http://www.us-cert.gov/cas/techalerts/TA07-317A.html US Government Resource
http://xs-sniper.com/blog/remote-command-exec-firefox-2005/
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-061
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4581
http://blogs.zdnet.com/security/?p=577
http://marc.info/?l=bugtraq&m=119143780202107&w=2
http://marc.info/?l=bugtraq&m=119144449915918&w=2
http://marc.info/?l=bugtraq&m=119159924712561&w=2
http://marc.info/?l=bugtraq&m=119168062128026&w=2
http://marc.info/?l=bugtraq&m=119194714125580&w=2
http://marc.info/?l=bugtraq&m=119195904813505&w=2
http://marc.info/?l=full-disclosure&m=119159477404263&w=2
http://marc.info/?l=full-disclosure&m=119168727402084&w=2
http://marc.info/?l=full-disclosure&m=119170531020020&w=2
http://marc.info/?l=full-disclosure&m=119171444628628&w=2
http://marc.info/?l=full-disclosure&m=119175323322021&w=2
http://marc.info/?l=full-disclosure&m=119180333805950&w=2
http://secunia.com/advisories/26201 Vendor Advisory
http://securitytracker.com/id?1018831
http://www.heise-security.co.uk/news/96982
http://www.kb.cert.org/vuls/id/403150 US Government Resource
http://www.microsoft.com/technet/security/advisory/943521.mspx
http://www.securityfocus.com/archive/1/481493/100/100/threaded
http://www.securityfocus.com/archive/1/481505/100/0/threaded
http://www.securityfocus.com/archive/1/481624/100/0/threaded
http://www.securityfocus.com/archive/1/481664/100/0/threaded
http://www.securityfocus.com/archive/1/481671/100/0/threaded
http://www.securityfocus.com/archive/1/481680/100/0/threaded
http://www.securityfocus.com/archive/1/481839/100/0/threaded
http://www.securityfocus.com/archive/1/481846/100/0/threaded
http://www.securityfocus.com/archive/1/481867/100/0/threaded
http://www.securityfocus.com/archive/1/481871/100/0/threaded
http://www.securityfocus.com/archive/1/481881/100/0/threaded
http://www.securityfocus.com/archive/1/481887/100/0/threaded
http://www.securityfocus.com/archive/1/482090/100/0/threaded
http://www.securityfocus.com/archive/1/482292/100/0/threaded
http://www.securityfocus.com/archive/1/482437/100/0/threaded
http://www.securityfocus.com/archive/1/484186/100/0/threaded
http://www.securityfocus.com/archive/1/484186/100/0/threaded
http://www.securityfocus.com/bid/25945
http://www.securitytracker.com/id?1018822
http://www.us-cert.gov/cas/techalerts/TA07-317A.html US Government Resource
http://xs-sniper.com/blog/remote-command-exec-firefox-2005/
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-061
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4581
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://blogs.zdnet.com/security/?p=577 - () http://blogs.zdnet.com/security/?p=577 -
References () http://marc.info/?l=bugtraq&m=119143780202107&w=2 - () http://marc.info/?l=bugtraq&m=119143780202107&w=2 -
References () http://marc.info/?l=bugtraq&m=119144449915918&w=2 - () http://marc.info/?l=bugtraq&m=119144449915918&w=2 -
References () http://marc.info/?l=bugtraq&m=119159924712561&w=2 - () http://marc.info/?l=bugtraq&m=119159924712561&w=2 -
References () http://marc.info/?l=bugtraq&m=119168062128026&w=2 - () http://marc.info/?l=bugtraq&m=119168062128026&w=2 -
References () http://marc.info/?l=bugtraq&m=119194714125580&w=2 - () http://marc.info/?l=bugtraq&m=119194714125580&w=2 -
References () http://marc.info/?l=bugtraq&m=119195904813505&w=2 - () http://marc.info/?l=bugtraq&m=119195904813505&w=2 -
References () http://marc.info/?l=full-disclosure&m=119159477404263&w=2 - () http://marc.info/?l=full-disclosure&m=119159477404263&w=2 -
References () http://marc.info/?l=full-disclosure&m=119168727402084&w=2 - () http://marc.info/?l=full-disclosure&m=119168727402084&w=2 -
References () http://marc.info/?l=full-disclosure&m=119170531020020&w=2 - () http://marc.info/?l=full-disclosure&m=119170531020020&w=2 -
References () http://marc.info/?l=full-disclosure&m=119171444628628&w=2 - () http://marc.info/?l=full-disclosure&m=119171444628628&w=2 -
References () http://marc.info/?l=full-disclosure&m=119175323322021&w=2 - () http://marc.info/?l=full-disclosure&m=119175323322021&w=2 -
References () http://marc.info/?l=full-disclosure&m=119180333805950&w=2 - () http://marc.info/?l=full-disclosure&m=119180333805950&w=2 -
References () http://secunia.com/advisories/26201 - Vendor Advisory () http://secunia.com/advisories/26201 - Vendor Advisory
References () http://securitytracker.com/id?1018831 - () http://securitytracker.com/id?1018831 -
References () http://www.heise-security.co.uk/news/96982 - () http://www.heise-security.co.uk/news/96982 -
References () http://www.kb.cert.org/vuls/id/403150 - US Government Resource () http://www.kb.cert.org/vuls/id/403150 - US Government Resource
References () http://www.microsoft.com/technet/security/advisory/943521.mspx - () http://www.microsoft.com/technet/security/advisory/943521.mspx -
References () http://www.securityfocus.com/archive/1/481493/100/100/threaded - () http://www.securityfocus.com/archive/1/481493/100/100/threaded -
References () http://www.securityfocus.com/archive/1/481505/100/0/threaded - () http://www.securityfocus.com/archive/1/481505/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481624/100/0/threaded - () http://www.securityfocus.com/archive/1/481624/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481664/100/0/threaded - () http://www.securityfocus.com/archive/1/481664/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481671/100/0/threaded - () http://www.securityfocus.com/archive/1/481671/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481680/100/0/threaded - () http://www.securityfocus.com/archive/1/481680/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481839/100/0/threaded - () http://www.securityfocus.com/archive/1/481839/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481846/100/0/threaded - () http://www.securityfocus.com/archive/1/481846/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481867/100/0/threaded - () http://www.securityfocus.com/archive/1/481867/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481871/100/0/threaded - () http://www.securityfocus.com/archive/1/481871/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481881/100/0/threaded - () http://www.securityfocus.com/archive/1/481881/100/0/threaded -
References () http://www.securityfocus.com/archive/1/481887/100/0/threaded - () http://www.securityfocus.com/archive/1/481887/100/0/threaded -
References () http://www.securityfocus.com/archive/1/482090/100/0/threaded - () http://www.securityfocus.com/archive/1/482090/100/0/threaded -
References () http://www.securityfocus.com/archive/1/482292/100/0/threaded - () http://www.securityfocus.com/archive/1/482292/100/0/threaded -
References () http://www.securityfocus.com/archive/1/482437/100/0/threaded - () http://www.securityfocus.com/archive/1/482437/100/0/threaded -
References () http://www.securityfocus.com/archive/1/484186/100/0/threaded - () http://www.securityfocus.com/archive/1/484186/100/0/threaded -
References () http://www.securityfocus.com/bid/25945 - () http://www.securityfocus.com/bid/25945 -
References () http://www.securitytracker.com/id?1018822 - () http://www.securitytracker.com/id?1018822 -
References () http://www.us-cert.gov/cas/techalerts/TA07-317A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-317A.html - US Government Resource
References () http://xs-sniper.com/blog/remote-command-exec-firefox-2005/ - () http://xs-sniper.com/blog/remote-command-exec-firefox-2005/ -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-061 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-061 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4581 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4581 -

Information

Published : 2007-10-11 00:17

Updated : 2024-11-21 00:34


NVD link : CVE-2007-3896

Mitre link : CVE-2007-3896

CVE.ORG link : CVE-2007-3896


JSON object : View

Products Affected

microsoft

  • internet_explorer
  • windows_2003_server
  • windows_xp
CWE
CWE-20

Improper Input Validation