The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
References
Link | Resource |
---|---|
http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html | Third Party Advisory |
http://www.kb.cert.org/vuls/id/539289 | Third Party Advisory US Government Resource |
http://www.securitytracker.com/id/1030818 | Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052 | Patch Vendor Advisory |
https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2014-02-26 14:55
Updated : 2024-02-04 18:35
NVD link : CVE-2013-7331
Mitre link : CVE-2013-7331
CVE.ORG link : CVE-2013-7331
JSON object : View
Products Affected
microsoft
- windows_8
- windows_server_2012
- windows_8.1
- windows_7
- windows_rt_8.1
- windows_rt
- internet_explorer
- windows_server_2008
- windows_vista
- windows_server_2003
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor