First published: Tue Jul 10 2007(Updated: )
Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6-sp1 | |
Mozilla Firefox | ||
Internet Explorer | =6 | |
Internet Explorer | =7.0 | |
Internet Explorer | =7.0-beta1 | |
Internet Explorer | =7.0-beta2 | |
Internet Explorer | =7.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3670 is classified as a moderate severity vulnerability.
To fix CVE-2007-3670, users should update Microsoft Internet Explorer to the latest version available for their system.
CVE-2007-3670 affects Microsoft Internet Explorer versions 6 SP1, 6, 7.0 and its beta versions, as well as Mozilla Firefox installed on those systems.
CVE-2007-3670 is an argument injection vulnerability that allows for cross-browser scripting attacks.
Yes, CVE-2007-3670 can potentially allow remote attackers to execute arbitrary commands on a vulnerable system.