Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2007-3896


The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.


Published

2007-10-11T00:17:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.3 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System microsoft windows_2003_server * No
Operating System microsoft windows_2003_server * No
Operating System microsoft windows_2003_server * No
Operating System microsoft windows_2003_server * No
Operating System microsoft windows_2003_server * No
Operating System microsoft windows_2003_server * No
Operating System microsoft windows_xp * No
Operating System microsoft windows_xp * No
Operating System microsoft windows_xp * No
Application microsoft internet_explorer 7.0 Yes

References