The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
References
Link | Resource |
---|---|
https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ | Exploit |
http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html | Third Party Advisory |
http://www.kb.cert.org/vuls/id/539289 | Third Party Advisory US Government Resource |
http://www.securitytracker.com/id/1030818 | Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2014-02-26 06:55
Updated : 2019-05-14 06:24
NVD link : CVE-2013-7331
Mitre link : CVE-2013-7331
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
microsoft
- windows_7
- windows_rt_8.1
- windows_vista
- windows_8.1
- windows_server_2008
- internet_explorer
- windows_8
- windows_rt
- windows_server_2012
- windows_server_2003