Check Point Reference: | CPAI-2007-030 |
Date Published: | 14 Mar 2007 |
Severity: | High |
Last Updated: | Monday 30 April, 2007 |
Source: | Microsoft Security Bulletin MS07-016 |
Industry Reference: | CVE-2007-0217 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4 Microsoft Internet Explorer 6 SP1 on Windows 2000 SP4 Microsoft Internet Explorer 6 for Windows XP SP2 Microsoft Internet Explorer 6 for Windows XP Professional x64 Edition Microsoft Internet Explorer 6 for Windows Server 2003 Microsoft Internet Explorer 6 for Windows Server 2003 SP1 Microsoft Internet Explorer 6 for Windows Server 2003 (Itanium) Microsoft Internet Explorer 6 for Windows Server 2003 SP1 (Itanium) Microsoft Internet Explorer 6 for Windows Server 2003 x64 Edition Microsoft Windows Internet Explorer 7 for Windows XP SP2 Microsoft Windows Internet Explorer 7 for Windows XP Professional x64 Edition Microsoft Windows Internet Explorer 7 for Windows Server 2003 SP1 Microsoft Windows Internet Explorer 7 for Windows Server 2003 SP1 (Itanium) Microsoft Windows Internet Explorer 7 for Windows Server 2003 x64 Edition |
Vulnerability Description | A remote code execution vulnerability has been reported in the way Microsoft Internet Explorer (IE) processes certain responses from FTP servers. The File Transfer Protocol (FTP) is used to connect computers over the Internet enabling file transferring between their users. An attacker can exploit the vulnerability to execute arbitrary code on an affected system. |
Update/Patch Avaliable | Apply patches: Microsoft Security Bulletin MS07-016 |
Vulnerability Details | The vulnerability is due to a memory corruption error in Microsoft Internet Explorer when handling specially crafted FTP server responses. A remote attacker can exploit this flaw via a specially crafted FTP response sent in an FTP session to the FTP client included in Internet Explorer. Successful exploitation allows execution of arbitrary code on a target system. |