{"vuid":"VU#457787","idnumber":"457787","name":"Microsoft Internet Explorer download dialog may not display complete filenames","keywords":["Microsoft Internet Explorer","dialog box","special characters","partial filename","MS01-058"],"overview":"There is a vulnerability in the download dialog box in Internet Explorer versions 5.5 and 6.0. The vulnerability allows an attacker to mislead users, causing them to inadvertently execute arbitrary code on the user's system.","clean_desc":"When downloading files included in web pages, users are often presented (depending on their security zone configuration) with a dialog box, requesting authorization to open or save the file. If an attacker includes certain malicious characters in the filename, the dialog box presented to the user may include misleading information about the nature of the file. In particular, the attacker may be able to cause a portion of the filename (such as the file extension) to not be included in the dialog box. An example exploit might cause an executable file to be presented as an image or a text file. If  the user chooses to open (run) the file based on its filename, they may inadvertently execute arbitrary code supplied by the attacker. The default setting of the dialog box is to \"save\" the file rather than \"open\" it. Users who accept the default option would only save the malicious code to their local systems. In order for the code to be executed, the user would have to intentionally execute the program by clicking \"open.\" This attack may occur in a malicious web page or in an HTML email message.","impact":"Attackers can manipulate file extensions to alter the behavior of a download dialog box, thus misleading users into executing arbitrary code. Any such code would run with the privileges of the user who initiated the download.","resolution":"Apply a patch from your vendor Microsoft has released a cumulative patch for Internet Explorer, correcting this vulnerability and several others. For more information about the patch and the vulnerabilities, please see Microsoft Security Bulletin MS01-058: http://www.microsoft.com/technet/security/bulletin/MS01-058.asp","workarounds":"Disable file downloads in untrusted security zones You can prevent the misleading dialog box from being presented to the user by disabling file downloads in untrusted security zones.","sysaffected":"","thanks":"Microsoft has publicly acknowledged Jouko Pynnonen of Oy Online Solutions Ltd as the reporter of this vulnerability.","author":"This document was written by Cory F. Cohen.","public":["http://www.microsoft.com/technet/security/bulletin/MS01-058.asp","http://www.securityfocus.com/bid/3597"],"cveids":["CVE-2001-0875"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-11-29T16:04:11Z","publicdate":"2001-12-13T00:00:00Z","datefirstpublished":"2001-12-14T21:45:13Z","dateupdated":"2002-01-03T21:09:48Z","revision":23,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"2","cam_attackeraccessrequired":"20","cam_scorecurrent":"6.9","cam_scorecurrentwidelyknown":"8.4","cam_scorecurrentwidelyknownexploited":"14.4","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.9,"vulnote":null}