vendor:
Internet Explorer
by:
Georgi Guninski, Seth Georgion
7.5
CVSS
HIGH
ActiveX Control Vulnerability
94
CWE
Product Name: Internet Explorer
Affected Version From: Microsoft Internet Explorer 5.0
Affected Version To: Microsoft Internet Explorer 5.0
Patch Exists: YES
Related CWE: N/A
CPE: a:microsoft:internet_explorer:5.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 95/Windows 98/Windows NT 4
2000
Microsoft Internet Explorer 5.0 for Windows 95/Windows 98/Windows NT 4 ActiveX ‘Object for constructing type libraries for scriptlets’ Vulnerability
The 'scriptlet.typlib' ActiveX control can create, edit, and overwrite files on the local disk. This means that an executable text file (e.g. a '.hta' file) can be written to the startup folder of a remote machine and will be executed the next time that machine reboots. Attackers can exploit this vulnerability via a malicious web page or an email message.
Mitigation:
Disable ActiveX controls in the browser settings, use a firewall to block malicious webpages, and use an antivirus to detect malicious emails.