{"vuid":"VU#585123","idnumber":"585123","name":"Microsoft Internet Explorer does not adequately evaluate malformed URLs","keywords":["Microsoft Internet Explorer","script code","cookie","Local Computer zone","MS02-015","MS02-023"],"overview":"Microsoft Internet Explorer contains a serious vulnerability in the way in which it evaluates malformed URLs.","clean_desc":"Microsoft Internet Explorer contains a vulnerability in the way in which it handles zone determination. Specifically, HTML scripts stored in cookies should be executed in the same zone (typically the \"Internet Zone\") as the site hosting the cookie. As a result of this vulnerability, a script embedded in a cookie can be executed in the Local Computer zone of the victim's machine. This places systems at risk because the security policies of the \"Local Computer Zone\" are typically more permissive than those of the \"Internet Zone.\" Viewing a malicious HTML document such as a web page or HTML formatted email message can allow arbitrary commands to be executed on the victim's machine.","impact":"An attacker can execute arbitrary code on the target system with the privileges of the victim.","resolution":"Apply vendor patches available from http://www.microsoft.com/windows/ie/downloads/critical/Q319182/default.asp.","workarounds":"","sysaffected":"","thanks":"The CERT/CC thanks Microsoft for the information contained in \nMS02-015","author":"This document was written by Ian A. Finlay, Shawn V. Hernan, and Shawn Van Ittersum.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","M","S","0","2","-","0","1","5",".","a","s","p"],"cveids":["CVE-2002-0078"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-03-29T14:06:28Z","publicdate":"2002-03-29T00:00:00Z","datefirstpublished":"2002-03-29T16:17:17Z","dateupdated":"2002-03-29T20:55:26Z","revision":62,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"17","cam_exploitation":"0","cam_internetinfrastructure":"6","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"51.75","cam_scorecurrentwidelyknown":"58.5","cam_scorecurrentwidelyknownexploited":"103.5","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":35.64,"vulnote":null}