The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/539289 - Third Party Advisory, US Government Resource | |
References | () http://www.securitytracker.com/id/1030818 - Third Party Advisory, VDB Entry | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052 - Patch, Vendor Advisory | |
References | () https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ - Exploit |
Information
Published : 2014-02-26 14:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7331
Mitre link : CVE-2013-7331
CVE.ORG link : CVE-2013-7331
JSON object : View
Products Affected
microsoft
- windows_vista
- windows_rt
- windows_7
- windows_8.1
- windows_rt_8.1
- windows_server_2012
- windows_server_2003
- windows_server_2008
- internet_explorer
- windows_8
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor