Vulnerability in MHTML Could Allow Information Disclosure
Publish date: March 06, 2013
Severity: HIGH
CVE Identifier: CVE-2011-0096
Advisory Date: FEB 02, 2011
DESCRIPTION
This vulnerability is found in Microsoft Windows. When exploited, a remote attacker is able to execute malicious scripts on the infected system when the user visits websites, thus, disclosing any private information from these sites. The impact of exploiting this vulnerability is the same as that caused by server-side cross-site scripting (XSS) vulnerabilities.
Microsoft has noted that this vulnerability existed because of the way MHTML processes requests that are in MIME format. It is possible that a remote attacker can inject a client-side script code as a response to a Web request when users are browsing the Internet using Internet Explorer (IE). The script is capable of spoofing content, disclosing information, or taking any action on affected websites on behalf of the user.
TREND MICRO PROTECTION INFORMATION
For more information, please refer to this Microsoft page:
Trend Micro Deep Security shields the following vulnerabilities using the specified rules. Trend Micro customers using OfficeScan with the Intrusion Defense Firewall plugin are also protected from attacks using these vulnerabilities.
Vulnerability ID | Identifier & Title | IDF First Pattern Version | IDF First Pattern Release Version |
---|---|---|---|
CVE-2011-0096 | 1004578 - Microsoft Internet Explorer MHTML MIME Handler Information Disclosure | 11-004 | Feb 01, 2011 |
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1004578
Trend Micro Deep Security DPI Rule Name: Microsoft Internet Explorer MHTML MIME Handler Information Disclosure
AFFECTED SOFTWARE AND VERSION
- Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista Service Pack 1
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 1
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for Itanium-based Systems
- Windows Server 2008 for Itanium-based Systems Service Pack 2
- Windows 7 for 32-bit Systems
- Windows 7 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for Itanium-based System
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more