CERT-In Vulnerability Note
CIVN-2011-0192
Multiple Vulnerabilities in Microsoft Internet Explorer
Original Issue Date:December 14, 2011
Severity Rating: HIGH
Systems Affected
- Windows XP SP3 and prior
- Windows XP Professional x64 Edition SP2 and prior
- Windows Server 2003 SP2 and prior
- Windows Server 2003 x64 Edition SP2 and prior
- Windows Vista SP2 and prior
- Windows Vista x64 Edition SP2 and prior
- Windows Server 2008 for 32-bit Systems SP2 and prior
- Windows Server 2008 for x64-based Systems SP2 and prior
- Windows 7 for 32-bit Systems SP1 and prior
- Windows 7 for x64-based Systems SP1 and prior
- Windows Server 2008 R2 for x64-based Systems SP1 and prior
- Windows Server 2008 R2 for Itanium-based Systems SP1 and prior
Component Affected
- Internet Explorer 6,7,8,9
Overview
Multiple vulnerabilities have been reported in Microsoft Internet Explorer that could allow a remote attacker to execute arbitrary code on a targeted system and access sensitive browser-based information.
Description
1. Insecure Library Loading Vulnerability
(
CVE-2011-2019
)
The vulnerability exists because of errors in loading mechanisms while handling .htm or .html files.. A remote attacker could exploit this vulnerability by convincing a user to open a file from a malicious file share to execute arbitrary code on the system with the privileges of the user. Workarounds Disable loading of libraries from WebDAV and remote network sharesDisable the WebClient serviceBlock TCP ports 139 and 445 at the firewall
2. Content-Disposition Header Handling Information Disclosure Vulnerability
(
CVE-2011-3404
)
The vulnerability exists because of errors in handling specially crafted Content-Disposition HTTP headers. A remote attacker could exploit this vulnerability by convincing a user to view a malicious website to disclose sensitive browser-based information.
3. Cross-Site Scripting Filter File Disclosure Vulnerability
(
CVE-2011-1992
)
The vulnerability exists because of the improper handling of malformed JavaScript code by the Internet Explorer XSS Filter. A remote attacker could exploit the vulnerability by convincing a user to visit a malicious site and hence disclose sensitive information Workarounds - Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
- Add sites that you trust to the Internet Explorer Trusted sites zone
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS11-099
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/MS11-099
References
SecurityTracker
http://securitytracker.com/id/1026413
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=24700
http://tools.cisco.com/security/center/viewAlert.x?alertId=24701
http://tools.cisco.com/security/center/viewAlert.x?alertId=24702
CVE Name
CVE-2011-2019
CVE-2011-3404
CVE-2011-1992
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|