Vulnerability Details : CVE-2007-3091
Race condition in Microsoft Internet Explorer 6 SP1; 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 allows remote attackers to execute arbitrary code or perform other actions upon a page transition, with the permissions of the old page and the content of the new page, as demonstrated by setInterval functions that set location.href within a try/catch expression, aka the "bait & switch vulnerability" or "Race Condition Cross-Domain Information Disclosure Vulnerability."
Vulnerability category: Execute codeInformation leak
Exploit prediction scoring system (EPSS) score for CVE-2007-3091
Probability of exploitation activity in the next 30 days: 95.20%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-3091
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
8.6
|
6.9
|
NIST |
CWE ids for CVE-2007-3091
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-3091
-
http://lcamtuf.coredump.cx/ierace/
wrong number (404)
-
http://securityreason.com/securityalert/2781
Assorted browser vulnerabilities - CXSecurity.com
- http://www.securityfocus.com/archive/1/470446/100/0/threaded
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019
Microsoft Security Bulletin MS09-019 - Critical | Microsoft Learn
-
http://www.kb.cert.org/vuls/id/471361
VU#471361 - Microsoft Internet Explorer cross-domain frame race conditionUS Government Resource
-
http://secunia.com/advisories/25564
About Secunia Research | FlexeraVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34696
Microsoft Internet Explorer page update cross-domain security bypass CVE-2007-3091 Vulnerability Report
-
http://osvdb.org/38497
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6041
404 Not Found
-
http://securitytracker.com/id?1018192
GoDaddy Domain Name Search
-
http://www.us-cert.gov/cas/techalerts/TA09-160A.html
Page Not Found | CISAUS Government Resource
- http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html
-
http://www.securityfocus.com/bid/24283
Patch
-
http://osvdb.org/54944
-
http://www.vupen.com/english/advisories/2009/1538
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPatch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2007/2064
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
Products affected by CVE-2007-3091
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:-:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:-:x32:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:-:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*