The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
20 Dec 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052 - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/539289 - Third Party Advisory, US Government Resource | |
References | () https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ - Exploit | |
References | () http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html - Third Party Advisory | |
References | () http://www.securitytracker.com/id/1030818 - Third Party Advisory, VDB Entry |
Information
Published : 2014-02-26 14:55
Updated : 2025-03-14 20:17
NVD link : CVE-2013-7331
Mitre link : CVE-2013-7331
JSON object : View
Products Affected
microsoft
- windows_7
- windows_8.1
- windows_vista
- windows_8
- internet_explorer
- windows_server_2003
- windows_rt_8.1
- windows_rt
- windows_server_2012
- windows_server_2008
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor