Short Name |
DNS:QUERY:ENC-STATUS-SPOOF |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
DNS |
Keywords |
Microsoft Internet Explorer Status Bar Spoofing |
Release Date |
2005/02/07 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. Attackers can send client DNS requests in response to the download of a maliciously crafted HTML document. These documents can contain links designed to trick Microsoft Internet Explorer into displaying the wrong URI in the status bar.
Microsoft Internet Explorer is prone to a vulnerability related to URI decoding. A bug in how the browser parses encoded URI data may allow zone bypass. As a result, it is possible to force the browser to interpret Web content in the Local Zone. This could be exploited to execute arbitrary code in the context of the user who is currently logged in. Cross-site scripting attacks are also possible due to this issue, as well as partial address bar obfuscation. This vulnerability is similar to the zone bypass attack described in BID 10517.