Check Point Advisories

Update Protection against Microsoft Internet Explorer FTP Responses Remote Code Execution Vulnerability (MS07-016)

Check Point Reference: CPAI-2007-030
Date Published: 14 Mar 2007
Severity: High
Last Updated: Monday 30 April, 2007
Source: Microsoft Security Bulletin MS07-016
Industry Reference:CVE-2007-0217
Protection Provided by:
Who is Vulnerable? Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4
Microsoft Internet Explorer 6 SP1 on Windows 2000 SP4
Microsoft Internet Explorer 6 for Windows XP SP2
Microsoft Internet Explorer 6 for Windows XP Professional x64 Edition
Microsoft Internet Explorer 6 for Windows Server 2003
Microsoft Internet Explorer 6 for Windows Server 2003 SP1
Microsoft Internet Explorer 6 for Windows Server 2003 (Itanium)
Microsoft Internet Explorer 6 for Windows Server 2003 SP1 (Itanium)
Microsoft Internet Explorer 6 for Windows Server 2003 x64 Edition
Microsoft Windows Internet Explorer 7 for Windows XP SP2
Microsoft Windows Internet Explorer 7 for Windows XP Professional x64 Edition
Microsoft Windows Internet Explorer 7 for Windows Server 2003 SP1
Microsoft Windows Internet Explorer 7 for Windows Server 2003 SP1 (Itanium)
Microsoft Windows Internet Explorer 7 for Windows Server 2003 x64 Edition
Vulnerability Description A remote code execution vulnerability has been reported in the way Microsoft Internet Explorer (IE) processes certain responses from FTP servers. The File Transfer Protocol (FTP) is used to connect computers over the Internet enabling file transferring between their users. An attacker can exploit the vulnerability to execute arbitrary code on an affected system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS07-016
Vulnerability DetailsThe vulnerability is due to a memory corruption error in Microsoft Internet Explorer when handling specially crafted FTP server responses. A remote attacker can exploit this flaw via a specially crafted FTP response sent in an FTP session to the FTP client included in Internet Explorer. Successful exploitation allows execution of arbitrary code on a target system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK