Vulnerabilities > CVE-2005-1191 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The Web View DLL (webvw.dll), as used in Windows Explorer on Windows 2000 systems, does not properly filter an apostrophe ("'") in the author name in a document, which allows attackers to execute arbitrary script via extra attributes when Web View constructs a mailto: link for the preview pane when the user selects the file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 8 |
Exploit-Db
description | Microsoft Windows 98/2000 Explorer Preview Pane Script Injection Vulnerability. CVE-2005-1191. Remote exploit for windows platform |
id | EDB-ID:25454 |
last seen | 2016-02-03 |
modified | 2005-04-19 |
published | 2005-04-19 |
reporter | GreyMagic Software |
source | https://www.exploit-db.com/download/25454/ |
title | Microsoft Windows 98/2000 Explorer Preview Pane Script Injection Vulnerability |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-024.NASL |
description | The remote host is running a version of Microsoft Windows that contains a security flaw in the Web View of the Windows Explorer that could allow an attacker to execute arbitrary code on the remote host. To succeed, the attacker would have to send a rogue file to a user of the remote computer and have him preview it using the Web View with the Windows Explorer. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18215 |
published | 2005-05-10 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18215 |
title | MS05-024: Vulnerability in Web View Could Allow Code Execution (894320) |
code |
|
Oval
accepted | 2011-05-16T04:02:50.093-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
description | The Web View DLL (webvw.dll), as used in Windows Explorer on Windows 2000 systems, does not properly filter an apostrophe ("'") in the author name in a document, which allows attackers to execute arbitrary script via extra attributes when Web View constructs a mailto: link for the preview pane when the user selects the file. | ||||||||||||||||||||
family | windows | ||||||||||||||||||||
id | oval:org.mitre.oval:def:3585 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2005-05-13T12:00:00.000-04:00 | ||||||||||||||||||||
title | Web View Remote Code Execution Vulnerability | ||||||||||||||||||||
version | 69 |
References
- http://www.securityfocus.com/archive/1/396224
- http://security.greymagic.com/security/advisories/gm015-ie
- http://www.securityfocus.com/bid/13248
- http://www.vupen.com/english/advisories/2005/0509
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20380
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3585
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-024