Vulnerabilities > CVE-2007-0217 - Unspecified vulnerability in Microsoft IE and Internet Explorer
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 8 | |
Application | 3 |
Exploit-Db
description | MS Internet Explorer (FTP Server Response) DoS Exploit (MS07-016). CVE-2007-0217. Dos exploit for windows platform |
id | EDB-ID:3444 |
last seen | 2016-01-31 |
modified | 2007-03-09 |
published | 2007-03-09 |
reporter | Mathew Rowley |
source | https://www.exploit-db.com/download/3444/ |
title | Microsoft Internet Explorer - FTP Server Response DoS Exploit MS07-016 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-016.NASL |
description | The remote host is missing the IE cumulative security update 92808. The remote version of IE is vulnerable to several flaws that could allow an attacker to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24340 |
published | 2007-02-13 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24340 |
title | MS07-016: Cumulative Security Update for Internet Explorer (928090) |
code |
|
Oval
accepted | 2015-08-03T04:00:12.034-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:1141 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2007-02-14T09:49:32 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | FTP Server Response Parsing Memory Corruption Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 71 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=473
- http://www.kb.cert.org/vuls/id/613564
- http://www.securityfocus.com/bid/22489
- http://www.osvdb.org/31892
- http://www.securitytracker.com/id?1017642
- http://secunia.com/advisories/24156
- http://www.us-cert.gov/cas/techalerts/TA07-044A.html
- http://www.vupen.com/english/advisories/2007/0584
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1141
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016
- http://www.securityfocus.com/archive/1/462303/100/0/threaded