Short Name |
HTTP:STC:IE:ZONE-SPOOF |
---|---|
Severity |
Info |
Recommended |
No |
Category |
HTTP |
Keywords |
Internet Explorer Zone Spoofing |
Release Date |
2005/02/07 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. Attackers can attempt to download a maliciously crafted HTML document; this document contains links that force Microsoft Internet Explorer to interpret the document in the wrong security zone.
Microsoft Internet Explorer is prone to a vulnerability related to URI decoding. A bug in how the browser parses encoded URI data may allow zone bypass. As a result, it is possible to force the browser to interpret Web content in the Local Zone. This could be exploited to execute arbitrary code in the context of the user who is currently logged in. Cross-site scripting attacks are also possible due to this issue, as well as partial address bar obfuscation. This vulnerability is similar to the zone bypass attack described in BID 10517.