Vulnerability Details : CVE-2007-3896
The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.
Vulnerability category: Input validation
Products affected by CVE-2007-3896
- cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3896
96.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3896
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-3896
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-3896
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4581
-
http://marc.info/?l=bugtraq&m=119143780202107&w=2
-
http://www.securityfocus.com/archive/1/481839/100/0/threaded
-
http://marc.info/?l=full-disclosure&m=119168727402084&w=2
-
http://marc.info/?l=full-disclosure&m=119180333805950&w=2
-
http://www.kb.cert.org/vuls/id/403150
US Government Resource
-
http://marc.info/?l=full-disclosure&m=119170531020020&w=2
-
http://www.microsoft.com/technet/security/advisory/943521.mspx
-
http://marc.info/?l=bugtraq&m=119144449915918&w=2
-
http://marc.info/?l=bugtraq&m=119194714125580&w=2
-
http://marc.info/?l=bugtraq&m=119168062128026&w=2
-
http://www.us-cert.gov/cas/techalerts/TA07-317A.html
US Government Resource
-
http://marc.info/?l=full-disclosure&m=119171444628628&w=2
-
http://www.securityfocus.com/bid/25945
-
http://www.securityfocus.com/archive/1/481493/100/100/threaded
-
http://www.securityfocus.com/archive/1/481846/100/0/threaded
-
http://www.securitytracker.com/id?1018822
-
http://www.securityfocus.com/archive/1/482437/100/0/threaded
-
http://marc.info/?l=full-disclosure&m=119175323322021&w=2
-
http://www.securityfocus.com/archive/1/481624/100/0/threaded
-
http://www.securityfocus.com/archive/1/481867/100/0/threaded
-
http://securitytracker.com/id?1018831
-
http://xs-sniper.com/blog/remote-command-exec-firefox-2005/
-
http://www.securityfocus.com/archive/1/481671/100/0/threaded
-
http://www.heise-security.co.uk/news/96982
-
http://www.securityfocus.com/archive/1/481664/100/0/threaded
-
http://www.securityfocus.com/archive/1/481881/100/0/threaded
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-061
-
http://marc.info/?l=full-disclosure&m=119159477404263&w=2
-
http://www.securityfocus.com/archive/1/482292/100/0/threaded
-
http://www.securityfocus.com/archive/1/481505/100/0/threaded
-
http://www.securityfocus.com/archive/1/482090/100/0/threaded
-
http://www.securityfocus.com/archive/1/481871/100/0/threaded
-
http://marc.info/?l=bugtraq&m=119195904813505&w=2
-
http://www.securityfocus.com/archive/1/484186/100/0/threaded
-
http://www.securityfocus.com/archive/1/481680/100/0/threaded
-
http://blogs.zdnet.com/security/?p=577
-
http://www.securityfocus.com/archive/1/481887/100/0/threaded
-
http://marc.info/?l=bugtraq&m=119159924712561&w=2
Jump to