Описание
Internet Explorer Information Disclosure Vulnerability
An information disclosure vulnerability exists when Internet Explorer improperly handles page content, which could allow an attacker to detect the existence of specific files on the user's system.
To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action. For example, an attacker could trick users into clicking a link that takes them to the attacker's site.
The security update addresses the vulnerability by helping to ensure that page content is properly validated in Internet Explorer.
Меры по смягчению последствий
The following mitigating factors may be helpful in your situation: An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Internet Explorer 11 on Windows 7 for 32-bit Systems Service Pack 1 | ||
Internet Explorer 11 on Windows 7 for x64-based Systems Service Pack 1 | ||
Internet Explorer 11 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Internet Explorer 10 on Windows Server 2012 | ||
Internet Explorer 11 on Windows 8.1 for 32-bit systems | ||
Internet Explorer 11 on Windows 8.1 for x64-based systems | ||
Internet Explorer 11 on Windows RT 8.1 | - | |
Internet Explorer 11 on Windows Server 2012 R2 | ||
Internet Explorer 11 on Windows 10 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 for x64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
2.6 Low
CVSS3
Связанные уязвимости
Microsoft Internet Explorer 10 and 11 load different files for attempts to open a file:// URL depending on whether the file exists, which allows local users to enumerate files via vectors involving a file:// URL and an HTML5 sandbox iframe, aka "Internet Explorer Information Disclosure Vulnerability."
Microsoft Internet Explorer 10 and 11 load different files for attempts to open a file:// URL depending on whether the file exists, which allows local users to enumerate files via vectors involving a file:// URL and an HTML5 sandbox iframe, aka "Internet Explorer Information Disclosure Vulnerability."
Уязвимость браузера Internet Explorer, позволяющая нарушителю пронумеровать файлы
EPSS
2.6 Low
CVSS3