Published:2010/12/15  Last Updated:2010/12/16
      
        JVN#30273074
        Internet Explorer vulnerable to cross-site scripting
              
      
      Overview
Microsoft Internet Explorer contains a vulnerability in handling specific character encoding which may result in a cross-site scripting attack.
Products Affected
- Internet Explorer 6 for Windows XP SP3
 - Internet Explorer 6 for Windows XP x64 Edition SP2
 - Internet Explorer 7 for Windows XP SP3
 - Internet Explorer 7 for Windows XP x64 Edition SP2
 - Internet Explorer 7 for Windows Vista SP1 and SP2
 - Internet Explorer 7 forWindows Vista x64 Edition SP1 and Windows Vista x64 Edition SP2
 - Internet Explorer 8 for Windows XP SP3
 - Internet Explorer 8 for Windows XP x64 Edition SP2
 - Internet Explorer 8 for Windows Vista SP1 and SP2
 - Internet Explorer 8 for Windows Vista x64 Edition SP1 and Windows Vista x64 Edition SP2
 - Internet Explorer 8 for Windows 7 and Windows 7 x64
 
For more information, refer to the information provided by Microsoft.
Description
Microsoft Internet Explorer contains a vulnerability in handling specific UTF-7 encoded characters, which may result in cross-site scripting.
Impact
An arbitrary script may be executed.
Solution
Update the Software
Apply the latest update according to the information provided by Microsoft.
Vendor Status
| Vendor | Status | Last Update | Vendor Notes | 
|---|---|---|---|
| FUJITSU LIMITED | notvulnerable | 2010/12/15 | |
| NEC Corporation | notvulnerable | 2010/12/16 | 
| Vendor | Link | 
| Microsoft Co.,Ltd. | Cumulative Security Update for Internet Explorer (2416400) | 
| Apache HTTP Server Project | Environment Variables in Apache -- 'suppress-error-charset' | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on
| Measures | Conditions | Severity | 
|---|---|---|
| Access Required | can be attacked over the Internet using packets | 
                
  | 
            
| Authentication | anonymous or no authentication (IP addresses do not count) | 
                
  | 
            
| User Interaction Required | the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file | 
                
  | 
            
| Exploit Complexity | the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspiciouse | 
                
  | 
            
Credit
Takeshi Terada and Yutaka Kokubu from Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory | 
                                     | 
              
| CPNI Advisory | 
                                     | 
              
| TRnotes | 
                                     | 
              
| CVE | 
                                    CVE-2010-3342 | 
              
| JVN iPedia | 
                                    JVNDB-2010-000063 | 
              
Update History
- 2010/12/16
 - NEC Corporation update status