HTTP: Windows WebView Word Doc Script Injection

This signature detects attempts to exploit a known vulnerability against Microsoft Word metadata files. An attacker can use improper characters in a Word document metadata. If a user selects the malicious document from a directory over HTTP, it can allow the attacker to run scripts on the user's computer. Note: The file does not need to be opened for the script to run.

Extended Description

When exploited, this vulnerability allows the attacker to execute arbitrary code on the vulnerable system.

Short Name
HTTP:XSS:WEB-VIEW-DOC-SCR-INJ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2005-0557 Doc Injection Script WebView Windows Word
Release Date
05/04/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown

Found a potential security threat?