HTTP: Internet Explorer Drag-and-Drop Modified
This signature detects attempts to exploit a known vulnerability against Internet Explorer. By sending an updated attack vector for the drag and drop vulnerability, a malicious attacker can upload arbitrary executables to the startup folder and compromise a host by tricking a user into viewing a malicious Web-site.
Extended Description
The Microsoft cumulative Internet Explorer patch (MS04-038) attempted to limit what files may be dragged and dropped onto the local computer from the Internet Zone to prevent executable objects from being placed on the file system in this manner. However, a number of file types are still permitted for drag and drop operations. It has demonstrated that it is possible to embed hostile HTML and script code in one of these file types, remove the file extension and then allow the operating system to dynamically determine the file type based on its contents. If this issue were combined with other vulnerabilities, such as that described in BID 11467, it may result in execution of arbitrary code on the client computer. Both Internet Explorer and Microsoft Windows itself is affected by this vulnerability.
Affected Products
Microsoft internet_explorer
References
BugTraq: 11466
CVE: CVE-2005-0053
URL: http://www.kb.cert.org/vuls/id/939688 http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Microsoft
7.5