Internet Explorer inline content filename extension vulnerability

2005-11-25T00:00:00
ID SAINT:3136A7CE974F10ED7CDF58070DDA45A0
Type saint
Reporter SAINT Corporation
Modified 2005-11-25T00:00:00

Description

Added: 11/25/2005
CVE: CVE-2001-0727
BID: 3578
OSVDB: 3033

Background

Internet Explorer is an HTML web browser which comes by default on Microsoft operating systems.

Problem

Using a null byte (%00) in the filename field found in the Content-disposition header, a remote web server may be able to disguise the content type of a downloaded file, leading to code execution. If "inline" is specified in the Content-disposition header, command execution could automatically occur without any user interaction.

Resolution

Install the patch referenced in Microsoft Security Bulletin 01-058.

References

<http://archives.neohapsis.com/archives/bugtraq/2002-01/0177.html>

Limitations

This exploit requires a user on the affected system to follow a link to the exploit using Internet Explorer.

Platforms

Windows