DNS: Microsoft Internet Explorer Status Bar Spoofing
This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. Attackers can send client DNS requests in response to the download of a maliciously crafted HTML document. These documents can contain links designed to trick Microsoft Internet Explorer into displaying the wrong URI in the status bar.
Extended Description
Microsoft Internet Explorer is prone to a vulnerability related to URI decoding. A bug in how the browser parses encoded URI data may allow zone bypass. As a result, it is possible to force the browser to interpret Web content in the Local Zone. This could be exploited to execute arbitrary code in the context of the user who is currently logged in. Cross-site scripting attacks are also possible due to this issue, as well as partial address bar obfuscation. This vulnerability is similar to the zone bypass attack described in BID 10517.
Affected Products
Nortel_networks symposium_web_client
References
BugTraq: 12473
CVE: CVE-2005-0054
URL: http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0290.html http://www.kb.cert.org/vuls/id/580299
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Microsoft
5.1