Release date:
Updated on:
Affected Systems:
Microsoft Internet Explorer 10.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 59657
Microsoft Internet Explorer is a Web browser launched by Microsoft.
XMLDOM in Internet Explorer 10.0.9200.16540 (Windows 7 Professional) has the file enumeration vulnerability and denial of service vulnerability. XMLDOM depends on the existence of files or directories, attackers can exploit this vulnerability to obtain useful information, such as the existence of files in the root directory of the system.
<* Source: Soroush Dalili (Irsdl@yahoo.com)
Link: http://secunia.com/advisories/53193/
Http://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Soroush Dalili (Irsdl@yahoo.com) provides the following test methods, see the following link:
Http://0me.me/demo/IE/dtdTest.html
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Microsoft
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.microsoft.com/windows/ie/default.asp