Exploit Microsoft Internet Explorer 6 - mms Protocol Handler Executable Command Line Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24354
Проверка EDB
  1. Пройдено
Автор
NICOLAS ROBILLARD
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2004-08-05
Microsoft Internet Explorer 6 - mms Protocol Handler Executable Command Line Injection
Код:
source: https://www.securityfocus.com/bid/10879/info

A vulnerability has been reported to exist in Microsoft Internet Explorer that may allow remote attackers to pass arbitrary command line arguments to an application associated with the mms: URI protocol handler. Windows Media Player is the application normally associated with this URI protocol handler. 

This vulnerability would permit an attacker to influence the invocation arguments for the executable and could result in loss of compromise of various security properties. This may be exploited from a malicious Web page or possibly through HTML email.

It is not known if this issue is specific to the mms: URI protocol handler or if other URI protocol handlers on the system may be similarly affected. This vulnerability could be a general issue in Internet Explorer with many possible attack vectors, although there is not enough information available at this time to make this determination.

<A HREF=mms:\\."%20/layout%20c>TRY IT</A>
 
Источник
www.exploit-db.com

Похожие темы