First published: Sun Oct 14 2007(Updated: )
Microsoft Internet Explorer 7 and earlier allows remote attackers to bypass the "File Download - Security Warning" dialog box and download arbitrary .exe files by placing a '?' (question mark) followed by a non-.exe filename after the .exe filename, as demonstrated by (1) .txt, (2) .cda, (3) .log, (4) .dif, (5) .sol, (6) .htt, (7) .itpc, (8) .itms, (9) .dvr-ms, (10) .dib, (11) .asf, (12) .tif, and unspecified other extensions, a different issue than CVE-2004-1331. NOTE: this issue might not cross privilege boundaries, although it does bypass an intended protection mechanism.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | <=7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5456 is categorized as a high severity vulnerability due to its potential to allow unauthorized file downloads.
To fix CVE-2007-5456, users should upgrade to a newer version of Internet Explorer that is not affected by this vulnerability.
CVE-2007-5456 specifically affects Microsoft Internet Explorer 7 and earlier versions.
Yes, CVE-2007-5456 can be exploited remotely by attackers to bypass security prompts and download files.
CVE-2007-5456 allows the download of arbitrary .exe files by manipulating the file name in the URL.