CVE-2008-2947

Cross-domain vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 7 allows remote attackers to access restricted information from other domains via JavaScript that uses the Object data type for the value of a (1) location or (2) location.href property, related to incorrect determination of the origin of web script, aka "Window Location Property Cross-Domain Vulnerability." NOTE: according to Microsoft, CVE-2008-2948 and CVE-2008-2949 are duplicates of this issue, probably different attack vectors.
References
Link Resource
http://blogs.zdnet.com/security/?p=1348 Press/Media Coverage
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Mailing List
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Mailing List
http://secunia.com/advisories/30857 Permissions Required Vendor Advisory
http://www.kb.cert.org/vuls/id/923508 Third Party Advisory US Government Resource
http://www.ph4nt0m.org-a.googlepages.com/PSTZine_0x02_0x04.txt Exploit
http://www.securityfocus.com/bid/29960 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020382 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1940/references Broken Link
http://www.vupen.com/english/advisories/2008/2809 Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058
https://exchange.xforce.ibmcloud.com/vulnerabilities/43366
https://exchange.xforce.ibmcloud.com/vulnerabilities/45565
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5901
http://blogs.zdnet.com/security/?p=1348 Press/Media Coverage
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Mailing List
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Mailing List
http://secunia.com/advisories/30857 Permissions Required Vendor Advisory
http://www.kb.cert.org/vuls/id/923508 Third Party Advisory US Government Resource
http://www.ph4nt0m.org-a.googlepages.com/PSTZine_0x02_0x04.txt Exploit
http://www.securityfocus.com/bid/29960 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020382 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1940/references Broken Link
http://www.vupen.com/english/advisories/2008/2809 Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058
https://exchange.xforce.ibmcloud.com/vulnerabilities/43366
https://exchange.xforce.ibmcloud.com/vulnerabilities/45565
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5901
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://blogs.zdnet.com/security/?p=1348 - Press/Media Coverage () http://blogs.zdnet.com/security/?p=1348 - Press/Media Coverage
References () http://marc.info/?l=bugtraq&m=122479227205998&w=2 - Mailing List () http://marc.info/?l=bugtraq&m=122479227205998&w=2 - Mailing List
References () http://secunia.com/advisories/30857 - Permissions Required, Vendor Advisory () http://secunia.com/advisories/30857 - Permissions Required, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/923508 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/923508 - Third Party Advisory, US Government Resource
References () http://www.ph4nt0m.org-a.googlepages.com/PSTZine_0x02_0x04.txt - Exploit () http://www.ph4nt0m.org-a.googlepages.com/PSTZine_0x02_0x04.txt - Exploit
References () http://www.securityfocus.com/bid/29960 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/29960 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1020382 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1020382 - Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA08-288A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-288A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2008/1940/references - Broken Link () http://www.vupen.com/english/advisories/2008/1940/references - Broken Link
References () http://www.vupen.com/english/advisories/2008/2809 - Broken Link () http://www.vupen.com/english/advisories/2008/2809 - Broken Link
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43366 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43366 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45565 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45565 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5901 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5901 -

Information

Published : 2008-06-30 22:41

Updated : 2024-11-21 00:48


NVD link : CVE-2008-2947

Mitre link : CVE-2008-2947

CVE.ORG link : CVE-2008-2947


JSON object : View

Products Affected

microsoft

  • internet_explorer
CWE
CWE-284

Improper Access Control