Описание
Internet Explorer Spoofing Vulnerability
A spoofing vulnerability exists when Internet Explorer improperly handles specific HTML content. An attacker who successfully exploited this vulnerability could trick a user into believing that the user was visiting a legitimate website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.
To exploit the vulnerability, the user must either browse to a malicious website or be redirected to it. In an email attack scenario, an attacker could send an email message in an attempt to convince the user to click a link to the malicious website.
In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message.
The security update addresses the vulnerability by correcting how Internet Explorer handles specific HTML content.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Internet Explorer 10 on Windows Server 2012 | ||
Internet Explorer 9 on Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Internet Explorer 9 on Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Internet Explorer 11 on Windows 10 Version 1703 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 Version 1703 for x64-based Systems | ||
Internet Explorer 11 on Windows 10 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 for x64-based Systems | ||
Internet Explorer 11 on Windows 10 Version 1511 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 Version 1511 for x64-based Systems | ||
Internet Explorer 11 on Windows 10 Version 1607 for 32-bit Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
2.4 Low
CVSS3
Связанные уязвимости
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into believing that the user was visiting a legitimate website, due to the way that Internet Explorer handles specific HTML content, aka "Internet Explorer Spoofing Vulnerability".
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into believing that the user was visiting a legitimate website, due to the way that Internet Explorer handles specific HTML content, aka "Internet Explorer Spoofing Vulnerability".
EPSS
2.4 Low
CVSS3