{"vuid":"VU#12746","idnumber":"12746","name":"Microsoft scriptlet.typlib ActiveX object unsafe for scripting from Internet Explorer","keywords":["MS","Microsoft","IE","Internet Explorer","ActiveX","scriptlet.typlib","scriptlets","safe for scripting","BubbleBoy","kak"],"overview":"The ActiveX control \"scriptlet.typlib\" is incorrectly marked \"safe for scripting\" in Internet Explorer (IE) versions 4.0 and 5.0, when it is actually unsafe for scripting.","clean_desc":"There exists a vulnerability in the default installation of an ActiveX control named \"scriptlet.typlib,\" used by developers to create type libraries for Windows Script Components. This ActiveX control allows local files to be created or modified and thus is unsafe for scripting by IE. However, it is incorrectly marked \"safe for scripting\" in IE versions 4.0 and 5.0 for Windows.","impact":"Any HTML document rendered in IE may call scriptlet.typlib and, without any warning displayed by IE, create or edit files with all permissions of the client user. Such attacks can occur when visiting unfriendly web sites, or rendering embedded HTML in email, newsgroup postings, or even server log entries.","resolution":"Install the appropriate patches available at: http://www.microsoft.com/technet/security/bulletin/MS99-032.asp","workarounds":"Disable ActiveX controls in IE.","sysaffected":"","thanks":"Thanks to Michael Kelfer for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.securityfocus.com/bid/598","http://xforce.iss.net/static/3244.php","http://www.microsoft.com/technet/security/bulletin/MS99-032.asp","http://support.microsoft.com/support/kb/articles/q240/3/08.asp","http://ciac.llnl.gov/ciac/bulletins/j-064.shtml","http://www.cert.org/reports/activeX_report.pdf"],"cveids":["CVE-1999-0668"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-02-27T00:59:58Z","publicdate":"1999-08-21T00:00:00Z","datefirstpublished":"2002-03-29T22:56:16Z","dateupdated":"2002-03-29T22:56:19Z","revision":20,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"14","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"13","cam_easeofexploitation":"2","cam_attackeraccessrequired":"20","cam_scorecurrent":"1.8525","cam_scorecurrentwidelyknown":"2.4375","cam_scorecurrentwidelyknownexploited":"4.3875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.8525,"vulnote":null}