First published: Wed Nov 12 2008(Updated: )
Cross-domain vulnerability in Microsoft XML Core Services 3.0 through 6.0, as used in Microsoft Expression Web, Office, Internet Explorer, and other products, allows remote attackers to obtain sensitive information from another domain and corrupt the session state via HTTP request header fields, as demonstrated by the Transfer-Encoding field, aka "MSXML Header Request Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft XML Core Services | =4.0 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Windows Server 2008 | ||
Microsoft Windows Server 2008 | =r2 | |
Microsoft Windows Server 2008 | =r2-sp1 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft XML Core Services | =3.0 | |
Microsoft XML Core Services | =6.0 | |
Microsoft Windows XP | =sp2 | |
Microsoft XML Core Services | =5.0 | |
Microsoft Expression Web | ||
Microsoft Expression Web | =2 | |
Microsoft Groove | =2007 | |
Microsoft Office | =2003-sp3 | |
Microsoft Office | =2007-sp1 | |
Microsoft Office Compatibility Pack | ||
Microsoft Office Compatibility Pack | =sp1 | |
Microsoft Office Word Viewer | =2003-sp3 | |
Microsoft SharePoint Server | =2007 | |
Microsoft SharePoint Server | =2007-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.