Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Update Available for "Untrusted Scripted Paste" Issue


View products that this article applies to.

This article was previously published under Q169245

↑ Back to the top


Summary

Microsoft has made an update available for the "Untrusted Scripted Paste" issue. This update addresses a problem regarding the way Internet Explorer uses the Document.ExecCommand to read a file on a user's computer that is in a known location.

NOTE: If you applied this patch prior to November 18, 1998, Microsoft recommends that you apply the most current version of this patch. For more information about the most current version of this patch, please see the following Microsoft Web site: Updates are available for the following products:
  • Internet Explorer 4.01 and Internet Explorer 4.01 Service Pack 1 (SP1) for Windows 95 and Windows NT 4.0 (x86 and Alpha)
  • Windows 98
  • Internet Explorer 4.01 for Windows 3.1 and Windows NT 3.51
The following products are not affected by this issue:
  • Internet Explorer 4.0 for Windows 95 and Windows NT 4.0
  • Internet Explorer 4.0 and 4.01 for Macintosh, UNIX on Sun Solaris, and Hewlett Packard HP-UX
  • Internet Explorer 3.0, 3.01 and 3.02 for Windows 95, Windows NT 4.0, Windows 3.1, Windows NT 3.51, and Macintosh
The "Untrusted Scripted Paste" issue involves a vulnerability in Internet Explorer that could allow a malicious hacker to circumvent certain Internet Explorer security safeguards. This vulnerability makes it possible for a malicious Web site operator to read the contents of a file on the user's computer that is in a known location. This could also be used to view the contents of a file on a network to which the user has access, and whose direct path name is known by the attacker. There have not been any reports of customers being affected by this problem.

This vulnerability could also affect software that uses Hypertext Markup Language (HTML) functionality provided by Internet Explorer, even if Internet Explorer is not used as your default browser.

↑ Back to the top


More information

Update Information By Product:

Internet Explorer 4.01 and Internet Explorer 4.01 SP1 for Windows 95 and Windows NT 4.0 on Intel x86 platforms:

Update file name: Ie4usp.exe
Available at: <WWLINK TYPE="GENERIC" VALUE="http://www.microsoft.com/windows/ie/security">http://www.microsoft.com/windows/ie/security</WWLINK>
				
   Updated file name    Size (bytes)   Date       Version
   ---------------------------------------------------------
   Mshtml.dll           2,414,864      12/18/98   4.72.3612.1700
				
Internet Explorer 4.01 and Internet Explorer 4.01 SP1 for Windows NT 4.0 on Alpha platforms:
   Update file name: Ie4usp.exe
				
   Available at: <WWLINK TYPE="GENERIC" VALUE="http://www.microsoft.com/windows/ie/security">http://www.microsoft.com/windows/ie/security</WWLINK>
				
   Updated file name    Size (bytes)   Date       Version
   ---------------------------------------------------------
   Mshtml.dll           3,938,064      11-13-98   4.72.3511.1300
				
Windows 98:
   Update file name: Ie4usp.exe
				
   Available at: Microsoft Windows Update site
				
   Updated file name    Size (bytes)   Date       Version
   ---------------------------------------------------------
   Mshtml.dll           2,414,864      11-13-98   4.72.3511.1300
				
Microsoft Internet Explorer 4.01 for Windows 3.1 and Windows NT 3.51:
   Update file name: Ie416usp.exe
				
   Available at: <WWLINK TYPE="GENERIC" VALUE="http://www.microsoft.com/windows/ie/security">http://www.microsoft.com/windows/ie/security</WWLINK>
				
   Updated file name    Size (bytes)   Date       Version
   ---------------------------------------------------------
   Mshtml16.dll         3,084,608      11-12-98   4.01.2510.1300
				

Reducing Your Risk If You Cannot Apply the Patch

Microsoft strongly encourages that you apply the patch. If you are unable to apply the patch, you can reduce your risk of being affected by this problem by temporarily disabling Active Scripting in Internet Explorer. To do so, follow these steps:
  1. Click Start, point to Settings, and then click Control Panel.
  2. Double-click Internet, and then click the Security tab.
  3. In the Zone box, click Internet Zone.
  4. Click Custom (For Expert Users), and then click Settings.
  5. Under Scripting, click Disable Under Active Scripting.
  6. Click OK.
  7. In the Zone box, click Restricted Sites Zone.
  8. Repeat steps 4-6.
  9. Click OK.
In addition, Microsoft recommends that you re-enable the prompt for submitting non-encrypted form data if it is disabled.

To enable this prompt, follow these steps:
  1. Click Start, point to Settings, and then click Control Panel.
  2. Double-click Internet, and then click the Security tab.
  3. In the Zone box, click Internet Zone.
  4. Click Custom (For Expert Users), and then click Settings.
  5. Under Miscellaneous, click Prompt or Disable (whichever you prefer) under Submit Non-Encrypted Form Data.
  6. Click OK.
  7. In the Zone box, click Restricted Sites Zone.
  8. Repeat steps 4-6.
  9. Click OK.
For additional information about Internet Explorer security zones, please see the following article in the Microsoft Knowledge Base:
   ARTICLE-ID: How to Use Security Zones in Internet Explorer 4.0
   TITLE     : <WWLINK TYPE="ARTICLE" VALUE="Q174360">Q174360</WWLINK>
				

↑ Back to the top


Keywords: kbenv, kbinfo, KB169245

↑ Back to the top

Article Info
Article ID : 169245
Revision : 6
Created on : 8/15/2007
Published on : 8/15/2007
Exists online : False
Views : 586