Microsoft Internet Explorer FirefoxURL command execution

ie-firefoxurl-command-execution (35346) The risk level is classified as HighHigh Risk

Description:

Microsoft Internet Explorer, when running on systems with Firefox installed, could allow a remote attacker to bypass cross-browser restrictions and execute arbitrary commands on a victim's system, caused by a vulnerability in the FirefoxURL and FirefoxHTML URI protocol handlers. By persuading a victim to visit a specially-crafted Web page that invokes one of the vulnerable protocol handlers, a remote attacker could inject and execute arbitrary shell commands on the victim's system.

*CVSS:

Base Score: 8
  Access Vector: Remote
  Access Complexity: High
  Authentication: Not Required
  Confidentiality Impact: Complete
  Integrity Impact: Complete
  Availability Impact: Complete
 
Temporal Score: 6.3
  Exploitability: Proof-Of-Concept
  Remediation Level: Official-Fix
  Report Confidence: Confirmed

Consequences:

Gain Access

Remedy:

Upgrade to the latest version of Firefox (2.0.0.5 or later) and Thunderbird (2.0.0.5 or later), as listed in MFSA 2007-23. See References.

For Mandriva Linux (mozilla-firefox):
Refer to MDKSA-2007:152 for patch, upgrade, or suggested workaround information. See References.

For SUSE Linux:
Refer to SUSE-SA:2007:049 for patch, upgrade, or suggested workaround information. See References.

For Ubuntu Linux (mozilla-thunderbird):
Refer to USN-503-1 for patch, upgrade, or suggested workaround information. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

  • Chromium Developer Documentation Web page: Release 1.0.154.48.
  • Full-Disclosure Mailing List, Sat Jul 14 2007 - 21:40:42 CDT: Re: Internet Explorer 0day exploit.
  • Full-Disclosure Mailing List, Sat Jul 14 2007 - 23:47:58 CDT: Re: Internet Explorer 0day exploit.
  • iDefense Labs PUBLIC ADVISORY: 07.19.07: Multiple Vendor Multiple Product URI Handler Input Validation Vulnerability.
  • Larholm.com Tuesday, July 10th, 2007 at 5:42: Internet Explorer 0day Exploit.
  • MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer.
  • MFSA 2007-40: Upgraded Thunderbird 1.5.0.13 missing fix for MFSA 2007-23.
  • Microsoft Internet Explorer Web site: Internet Explorer: Home Page.
  • Mozilla Firefox Web site: Firefox - Rediscover the Web.
  • BID-24837: Microsoft Internet Explorer and Mozilla Firefox URI Handler Command Injection Vulnerability
  • CVE-2007-3670: Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a defense in depth fix that will prevent IE from sending Fir
  • MDKSA-2007:152: Updated Firefox packages fix multiple vulnerabilities
  • OSVDB ID: 38017: Microsoft IE with Mozilla Firefox Cross-browser Command Execution
  • OSVDB ID: 38018: Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
  • OSVDB ID: 38211: Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
  • OSVDB ID: 41090: Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
  • OSVDB ID: 41188: Mozilla Firefox URI Handling Null Byte Argument Injection
  • OSVDB ID: 46832: Netscape Navigator Multiple URI Handlers NULL Byte Argument Injection
  • OSVDB ID: 46931: Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
  • OSVDB ID: 46932: Mozilla Firefox w/ Thunderbird mailto URI Arbitrary Command Injection
  • OSVDB ID: 46933: Mozilla Unspecified Product URI Handling Arbitrary Command Injection
  • SA25984: Firefox "firefoxurl" URI Handler Registration Vulnerability
  • SA26096: Mozilla Thunderbird Two Vulnerabilities
  • SA28179: Thunderbird Multiple Vulnerabilities
  • SECTRACK ID: 1018351: Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
  • SECTRACK ID: 1018360: Mozilla Firefox Bugs in URL Protocol Handlers Let Remote Users Execute Arbitrary Commands
  • SUSE-SA:2007:049: Mozilla security problems
  • US-CERT VU#358017: Mozilla Firefox URL protocol handling vulnerability
  • USN-503-1: Thunderbird vulnerabilities

Platforms Affected:

  • Canonical Ubuntu 6.06 LTS
  • Canonical Ubuntu 6.10
  • Canonical Ubuntu 7.04
  • MandrakeSoft Mandrake Linux 2007
  • MandrakeSoft Mandrake Linux 2007 X86_64
  • MandrakeSoft Mandrake Linux 2007.1
  • MandrakeSoft Mandrake Linux 2007.1 X86_64
  • MandrakeSoft Mandrake Linux 2008.0 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0
  • MandrakeSoft Mandrake Linux Corporate Server 3.0 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 4.0 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 4.0
  • Microsoft Internet Explorer 6.0
  • Microsoft Internet Explorer 6.0 SP1
  • Microsoft Internet Explorer 7.0 beta2
  • Microsoft Internet Explorer 7.0 beta1
  • Microsoft Internet Explorer 7.0
  • Microsoft Internet Explorer 7.0 beta3
  • Mozilla Firefox 2.0
  • Mozilla Firefox 2.0.0.1
  • Mozilla Firefox 2.0.0.2
  • Mozilla Firefox 2.0.0.3
  • Mozilla Firefox 2.0.0.4
  • Mozilla Thunderbird 1.5.0.13
  • Novell Linux Desktop 9
  • Novell Linux POS 9
  • Novell Open Enterprise Server
  • Novell Open Enterprise Server
  • Novell OpenSUSE 10.2
  • Novell SUSE Linux Enterprise Desktop 10 SP1
  • Novell SUSE Linux Enterprise Server 10
  • Novell SUSE Linux Enterprise Server 10 SP1
  • Novell UnitedLinux 1.0
  • SuSE Linux Enterprise Server 8
  • SUSE SuSE Linux 10.0
  • SUSE SuSE Linux 10.1
  • SuSE SuSE Linux OpenExchange Server 4
  • SuSE SuSE Linux Retail Solution 8
  • SuSE SuSE Linux School Server
  • SuSE SuSE Linux Standard Server 8
  • SuSE SuSE SLES 9

Reported:

Jul 10, 2007

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page