Microsoft Internet Explorer 5.5 Print Template ActiveX Vulnerability
BID:2046
Info
Microsoft Internet Explorer 5.5 Print Template ActiveX Vulnerability
| Bugtraq ID: | 2046 |
| Class: | Access Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Dec 01 2000 12:00AM |
| Updated: | Dec 01 2000 12:00AM |
| Credit: | Discovered by Warren R. Greer and publicized in a Microsoft Security Bulletin (MS00-093) on December 1, 2000. |
| Vulnerable: |
Microsoft Internet Explorer 5.5 |
| Not Vulnerable: | |
Discussion
Microsoft Internet Explorer 5.5 Print Template ActiveX Vulnerability
Microsoft Internet Explorer 5.5 is susceptible to a vulnerability that would allow a malicious website operator to execute arbitrary ActiveX controls on a target system. This is due to an implementation flaw in the print template feature.
Print templates is the mechanism used by Internet Explorer 5.5 that controls print/print preview behavior and allows customization of the layout of browser documents when printing/print previewing. They are considered trusted code and therefore are able to execute any ActiveX control regardless of whether they have been marked safe for scripting or not. Under normal circumstances, custom print templates that are served up by a website should only be executed if the user agrees to do so. However, it is possible to circumvent this and a website would be able to proceed to process the print template and run the ActiveX control of their choice which spans a wide range of actions including addition, deletion, execution, and modification of files on the remote system.
If ActiveX controls were disabled in Internet Explorer, this vulnerability could not be exploited.
Microsoft Internet Explorer 5.5 is susceptible to a vulnerability that would allow a malicious website operator to execute arbitrary ActiveX controls on a target system. This is due to an implementation flaw in the print template feature.
Print templates is the mechanism used by Internet Explorer 5.5 that controls print/print preview behavior and allows customization of the layout of browser documents when printing/print previewing. They are considered trusted code and therefore are able to execute any ActiveX control regardless of whether they have been marked safe for scripting or not. Under normal circumstances, custom print templates that are served up by a website should only be executed if the user agrees to do so. However, it is possible to circumvent this and a website would be able to proceed to process the print template and run the ActiveX control of their choice which spans a wide range of actions including addition, deletion, execution, and modification of files on the remote system.
If ActiveX controls were disabled in Internet Explorer, this vulnerability could not be exploited.
Exploit / POC
Microsoft Internet Explorer 5.5 Print Template ActiveX Vulnerability
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Microsoft Internet Explorer 5.5 Print Template ActiveX Vulnerability
Solution:
Microsoft has released the following patch which eliminates this vulnerability:
Microsoft Internet Explorer 5.5
Solution:
Microsoft has released the following patch which eliminates this vulnerability:
Microsoft Internet Explorer 5.5
References
Microsoft Internet Explorer 5.5 Print Template ActiveX Vulnerability
References:
References: