CVE-2007-5456
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Microsoft Internet Explorer 7 and earlier allows remote attackers to bypass the "File Download - Security Warning" dialog box and download arbitrary .exe files by placing a '?' (question mark) followed by a non-.exe filename after the .exe filename, as demonstrated by (1) .txt, (2) .cda, (3) .log, (4) .dif, (5) .sol, (6) .htt, (7) .itpc, (8) .itms, (9) .dvr-ms, (10) .dib, (11) .asf, (12) .tif, and unspecified other extensions, a different issue than CVE-2004-1331. NOTE: this issue might not cross privilege boundaries, although it does bypass an intended protection mechanism.
Microsoft Internet Explorer versión 7 y anteriores, permite a atacantes remotos omitir el cuadro de diálogo "File Download - Security Warning" y descargar archivos .exe arbitrarios colocando un '?' (signo de interrogación) seguido por un nombre de archivo que no sea .exe después del nombre de archivo .exe, como es demostrado por las extensiones (1) .txt, (2) .cda, (3) .log, (4) .dif, (5) .sol , (6) .htt, (7) .itpc, (8) .itms, (9) .dvr-ms, (10) .dib, (11) .asf, (12) .tif y otras no especificadas, un problema diferente de CVE-2004-1331. NOTA: este problema podría no cruzar los límites de privilegio, aunque omite un mecanismo de protección previsto.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-10-14 CVE Reserved
- 2007-10-14 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/3222 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/482220/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/482248/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/482297/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/482314/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/26062 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Internet Explorer Search vendor "Microsoft" for product "Internet Explorer" | <= 7 Search vendor "Microsoft" for product "Internet Explorer" and version " <= 7" | - |
Affected
|