6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.938 High
EPSS
Percentile
99.1%
The Windows Vista Weather gadget contains a vulnerability that may allow and attacker to execute code.
From Microsoft Security Bulletin MS07-048:
Gadgets are mini-applications designed to provide the user with information or utilities. Windows Vista treats gadgets similar to the way Windows Vista treats other executable code. Gadgets are written using HTML and script, but this HTML is not located on an arbitrary remote server as web pages are. HTML content in the Gadget is downloaded first as part of a package of resources and configuration files and then executed from the local computer. This download process is similar to applications (.exe files) downloaded from the Internet.
The Windows Vista Weather gadget contains a vulnerability that occurs because the gadget does not properly parse HTML attributes.
To exploit this vulnerability, an attacker may need to be able to intercept a data stream destined for the weather gadget and inject malicious content.
A remote, unauthenticated attacker may be able to execute arbitrary code, or create a denial-of-service condition.
Update
Microsoft has released update MS07-048 to address this issue.
Disable the Weather gadget
Until updates can be applied, disabling the Weather gadget will mitigate this vulnerability. To disable the Weather gadget, see the workarounds section of Microsoft Security Bulletin MS07-048.
542808
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: August 15, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://www.microsoft.com/technet/security/bulletin/ms07-048.mspx> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23542808 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Microsoft for information that was used in this report.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2007-3891 |
---|---|
Severity Metric: | 2.92 Date Public: |