Used Microsoft XML 3.0 Core Services Vulnerability Patch for Windows?


Download.com has chosen not to provide a direct-download link for this product and offers this page for informational purposes only.

Editors’ Review

Download.com staff
This patch fixes a security flaw in the XMLHTTP ActiveX control of MSXML. It prevents unauthorized access to local system data via redirected HTTP requests.
  • Pros

    • Enables web pages to send and receive XML data via HTTP.
    • Includes security measures to restrict data requests.
    • Restricts attacker's ability to modify or delete data.
  • Cons

    • Vulnerability allows reading local system files.
    • Requires user to visit attacker-controlled site.
    • Attacker needs exact file path and name.

Used Microsoft XML 3.0 Core Services Vulnerability Patch for Windows?


Explore More


Full Specifications

GENERAL
Release
Latest update
Version
MS02-008
OPERATING SYSTEMS
Platform
Windows
Operating System
  • Windows 2000
  • Windows NT
  • Windows 10
Additional Requirements
Windows NT/2000
POPULARITY
Total Downloads
62,629
Downloads Last Week
0

Report Software

Program available in other languages


Last Updated


User Reviews

3.2/5

9 User Votes


Developer’s Description

System administrators using Microsoft XML Core Services 2.6 and later should download this patch.
Microsoft XML Core Services (MSXML) includes the XMLHTTP ActiveX control, which allows web pages rendering in the browser to send or receive XML data via HTTP operations such as POST, GET, and PUT. The control provides security measures designed to restrict web pages so they can only use the control to request data from remote data sources.

A flaw exists in how the XMLHTTP control applies IE security zone settings to a redirected data stream returned in response to a request for data from a web site. A vulnerability results because an attacker could seek to exploit this flaw and specify a data source that is on the user's local system. The attacker could then use this to return information from the local system to the attacker's web site. An attacker would have to entice the user to a site under his control to exploit this vulnerability. It cannot be exploited by HTML email. In addition, the attacker would have to know the full path and file name of any file he would attempt to read. Finally, this vulnerability does not give an attacker any ability to add, change or delete data.


Download.com
Your review for Microsoft XML 3.0 Core Services Vulnerability Patch