Published:2010/12/15 Last Updated:2010/12/16
JVN#30273074
Internet Explorer vulnerable to cross-site scripting
Overview
Microsoft Internet Explorer contains a vulnerability in handling specific character encoding which may result in a cross-site scripting attack.
Products Affected
- Internet Explorer 6 for Windows XP SP3
- Internet Explorer 6 for Windows XP x64 Edition SP2
- Internet Explorer 7 for Windows XP SP3
- Internet Explorer 7 for Windows XP x64 Edition SP2
- Internet Explorer 7 for Windows Vista SP1 and SP2
- Internet Explorer 7 forWindows Vista x64 Edition SP1 and Windows Vista x64 Edition SP2
- Internet Explorer 8 for Windows XP SP3
- Internet Explorer 8 for Windows XP x64 Edition SP2
- Internet Explorer 8 for Windows Vista SP1 and SP2
- Internet Explorer 8 for Windows Vista x64 Edition SP1 and Windows Vista x64 Edition SP2
- Internet Explorer 8 for Windows 7 and Windows 7 x64
For more information, refer to the information provided by Microsoft.
Description
Microsoft Internet Explorer contains a vulnerability in handling specific UTF-7 encoded characters, which may result in cross-site scripting.
Impact
An arbitrary script may be executed.
Solution
Update the Software
Apply the latest update according to the information provided by Microsoft.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
FUJITSU LIMITED | notvulnerable | 2010/12/15 | |
NEC Corporation | notvulnerable | 2010/12/16 |
Vendor | Link |
Microsoft Co.,Ltd. | Cumulative Security Update for Internet Explorer (2416400) |
Apache HTTP Server Project | Environment Variables in Apache -- 'suppress-error-charset' |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspiciouse |
|
Credit
Takeshi Terada and Yutaka Kokubu from Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2010-3342 |
JVN iPedia |
JVNDB-2010-000063 |
Update History
- 2010/12/16
- NEC Corporation update status