The Internet Explorer security architecture provides a
caching mechanism that is used to store content that needs to be downloaded and
processed on the user's local computer. The purpose of the cache is to
obfuscate the physical location of the cached content, in order to ensure that
the Web page or HyperText Markup Language (HTML) e-mail work through the
Internet Explorer security architecture to gain access to the information. This
ensures that use of the information can be properly restricted.
A
vulnerability exists because it is possible for a Web page or HTML e-mail to
learn the physical location of cached content. By using this information, a
malicious user could cause the cached content to be opened in the Local
Computer Zone. For example, this would enable the malicious user to start
compiled HTML help (.chm) files that contain shortcuts to .exe file, thereby
enabling the malicious user to run the .exe files.
This vulnerability
cannot be exploited without some user action such as either browsing to the
malicious user's site or opening an e-mail message from the malicious user.
Customers who exercise safe browsing habits would be less likely to visit
untrustworthy sites. Likewise, customers who have used the Security Zones
feature to restrict what HTML e-mail messages can do would be less likely to be
affected by this vulnerability.
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.