{"vuid":"VU#326549","idnumber":"326549","name":"Microsoft Windows MHTML script injection vulnerability","keywords":["Microsoft","MS","Windows","MHTML","2501696","XP","Server 2003","Vista","Windows 7","information disclosure"],"overview":"Microsoft Windows contains an script injection vulnerability in the MHTML protocol handler, which may allow an attacker to execute arbitrary script within the context of another website domain.","clean_desc":"Microsoft Windows contains a script injection vulnerability caused by the way MHTML interprets MIME-formatted requests for content blocks within a document. According to Microsoft TechNet Security Research & Defense blog: \"It is possible under certain conditions for this vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim's Internet Explorer. The script could spoof content, disclose information, or take any action that the user could take on the affected Web site on behalf of the targeted user.\"","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker may be able to obtain access to web content in another domain. The impact is similar to that of a cross-site scripting vulnerability. For a more detailed description of the impact of cross-site scripting vulnerabilities, please see CERT Advisory CA-2000-02.","resolution":"Apply an update This issue is addressed in Microsoft Security Bulletin MS11-026.","workarounds":"Lock down the MHTML protocol handler Microsoft TechNet Security Research & Defense blog has released Microsoft Fix it 50602 to help mitigate this vulnerability.","sysaffected":"","thanks":"Thanks to Microsoft Security Response Center for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["http://www.microsoft.com/technet/security/bulletin/ms11-026.mspx","http://www.microsoft.com/technet/security/advisory/2501696.mspx","http://blogs.technet.com/srd/","http://go.microsoft.com/?linkid=9760419"],"cveids":["CVE-2011-0096"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-01-27T21:37:53Z","publicdate":"2011-01-28T00:00:00Z","datefirstpublished":"2011-01-28T19:40:57Z","dateupdated":"2011-04-12T17:31:21Z","revision":18,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"9","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"20","cam_attackeraccessrequired":"9","cam_scorecurrent":"11.745","cam_scorecurrentwidelyknown":"11.745","cam_scorecurrentwidelyknownexploited":"19.845","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.745,"vulnote":null}