The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.
2007-10-11T00:17:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 9.3 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | microsoft | windows_2003_server | * | No |
| Operating System | microsoft | windows_2003_server | * | No |
| Operating System | microsoft | windows_2003_server | * | No |
| Operating System | microsoft | windows_2003_server | * | No |
| Operating System | microsoft | windows_2003_server | * | No |
| Operating System | microsoft | windows_2003_server | * | No |
| Operating System | microsoft | windows_xp | * | No |
| Operating System | microsoft | windows_xp | * | No |
| Operating System | microsoft | windows_xp | * | No |
| Application | microsoft | internet_explorer | 7.0 | Yes |