// For flags

CVE-2007-3896

Microsoft Windows - URI Handler Command Execution

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.

El manejo de URL en la biblioteca Shell32.dll en el shell de Windows en Microsoft Windows XP y Server 2003, con Internet Explorer versión 7 instalado, permite a atacantes remotos ejecutar programas arbitrarios por medio de secuencias "%" no válidas en un mailto: u otro manejador URI, como es demostrado usando mIRC, Outlook, Firefox, Adobe Reader, Skype y otras aplicaciones. NOTA: este problema podría estar relacionado con otros problemas relacionados con los controladores de URL en sistemas Windows, tal y como CVE-2007-3845. También puede haber problemas separados pero estrechamente relacionados en las aplicaciones que son invocadas por los manejadores.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-07-19 CVE Reserved
  • 2007-10-05 First Exploit
  • 2007-10-11 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-14 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (41)
URL Tag Source
http://blogs.zdnet.com/security/?p=577 X_refsource_misc
http://marc.info/?l=bugtraq&m=119143780202107&w=2 Mailing List
http://marc.info/?l=bugtraq&m=119144449915918&w=2 Mailing List
http://marc.info/?l=bugtraq&m=119159924712561&w=2 Mailing List
http://marc.info/?l=bugtraq&m=119168062128026&w=2 Mailing List
http://marc.info/?l=bugtraq&m=119194714125580&w=2 Mailing List
http://marc.info/?l=bugtraq&m=119195904813505&w=2 Mailing List
http://marc.info/?l=full-disclosure&m=119159477404263&w=2 Mailing List
http://marc.info/?l=full-disclosure&m=119168727402084&w=2 Mailing List
http://marc.info/?l=full-disclosure&m=119170531020020&w=2 Mailing List
http://marc.info/?l=full-disclosure&m=119171444628628&w=2 Mailing List
http://marc.info/?l=full-disclosure&m=119175323322021&w=2 Mailing List
http://marc.info/?l=full-disclosure&m=119180333805950&w=2 Mailing List
http://securitytracker.com/id?1018831 Vdb Entry
http://www.heise-security.co.uk/news/96982 X_refsource_misc
http://www.kb.cert.org/vuls/id/403150 Third Party Advisory
http://www.securityfocus.com/archive/1/481493/100/100/threaded Mailing List
http://www.securityfocus.com/archive/1/481505/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481624/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481664/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481671/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481680/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481839/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481846/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481867/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481871/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481881/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481887/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/482090/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/482292/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/482437/100/0/threaded Mailing List
http://www.securityfocus.com/bid/25945 Vdb Entry
http://www.securitytracker.com/id?1018822 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA07-317A.html Third Party Advisory
http://xs-sniper.com/blog/remote-command-exec-firefox-2005 X_refsource_misc
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4581 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2003 Server
Search vendor "Microsoft" for product "Windows 2003 Server"
*itanium
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2003 Server
Search vendor "Microsoft" for product "Windows 2003 Server"
*x64
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2003 Server
Search vendor "Microsoft" for product "Windows 2003 Server"
*sp1
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2003 Server
Search vendor "Microsoft" for product "Windows 2003 Server"
*sp2
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2003 Server
Search vendor "Microsoft" for product "Windows 2003 Server"
*sp2, itanium
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 2003 Server
Search vendor "Microsoft" for product "Windows 2003 Server"
*sp2, x64
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Xp
Search vendor "Microsoft" for product "Windows Xp"
*x64
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Xp
Search vendor "Microsoft" for product "Windows Xp"
*sp2
Safe
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
7.0
Search vendor "Microsoft" for product "Internet Explorer" and version "7.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Xp
Search vendor "Microsoft" for product "Windows Xp"
*sp2, x64
Safe