First published: Wed Jun 11 2014(Updated: )
Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka "MSXML Entity URI Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft XML Core Services | =3.0 | |
Microsoft XML Core Services | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1816 is considered a moderate severity vulnerability.
To fix CVE-2014-1816, you should update Microsoft XML Core Services to a patched version.
CVE-2014-1816 affects Microsoft XML Core Services version 3.0 and 6.0.
An attacker exploiting CVE-2014-1816 can potentially discover full pathnames and local usernames from the client system.
There are no specific workarounds for CVE-2014-1816; applying the security update is recommended.