Microsoft Internet Explorer and...

- AV AC AU C I A
发布: 2000-06-24
修订: 2025-04-13

Under certain circumstances, Microsoft Internet Explorer and Outlook/Outlook Express will download files to the local TEMP directory even if a user has specifically cancelled a request to do so. The file could then be forcibly executed via an ActiveX control. For forcible execution, the correct path to the system's default temp folder must be specified in the ActiveX control. If a malicious web site operator were to embed certain tags in a base 64 encoded HTML frameset a File Download dialogue box would appear when a user visits the webpage. This dialogue box would prompt the user to either save or open the file, or cancel the download altogether. The file will be downloaded to the TEMP directory regardless of what option a user chooses, including cancel. This vulnerability still applies even if the Security Zone settings are configured to disable downloads. In this case, a dialogue box would appear stating that file downloads are not permitted, however, the file would still be...

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息