- The "Scriptlet Rendering" vulnerability. The ActiveX control that is used to invoked scriptlets is also a rendering engine for Hypertext Markup Language (HTML) and other file types such as .txt and .doc files. Because of this functionality, a malicious Web site operator can provide incorrect information that consists of script for the purpose of introducing it into an Internet Explorer system file with a known name, and then using the Scriptlet control to render the file. This action would make the script run in the Local Computer Zone, at which point it could obtain access to files on the local computer. For information about this vulnerability, view the following Microsoft Web site: For a list of frequently asked questions about this vulnerability, view the following Microsoft Web site:
- A new variant of the "Frame Domain Verification" vulnerability that was fixed in Internet Explorer 5.01. For information about this vulnerability, view the following Microsoft Web site: To exploit the first two vulnerabilities, a malicious Web site operator would need to know, or guess, the exact name and path of each file the malicious Web site operator wants to view. Even then, the malicious Web site operator could only view file types that can be opened in a browser window such as .txt or .doc files, but not .exe or .dat files. If the Web site were in a zone where active scripting is disabled, neither vulnerability could be exploited.
- A patch for the "IE Script" Vulnerability that is documented at the following Microsoft Web site is also included:
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.