Vulnerability Description
Argument injection vulnerability in the Linden Lab Second Life secondlife:// protocol handler, as used in Internet Explorer and possibly Firefox, allows remote attackers to obtain sensitive information via a '" ' (double-quote space) sequence followed by the -autologin and -loginuri arguments, which cause the handler to post login credentials and software installation details to an arbitrary URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linden Lab | Second Life | 1 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/26845Vendor Advisory
- http://www.gnucitizen.org/blog/ie-pwns-secondlife
- http://www.securityfocus.com/archive/1/479698/100/0/threaded
- http://www.vupen.com/english/advisories/2007/3188
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36651
- http://secunia.com/advisories/26845Vendor Advisory
- http://www.gnucitizen.org/blog/ie-pwns-secondlife
- http://www.securityfocus.com/archive/1/479698/100/0/threaded
- http://www.vupen.com/english/advisories/2007/3188
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36651
FAQ
What is CVE-2007-4960?
CVE-2007-4960 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Argument injection vulnerability in the Linden Lab Second Life secondlife:// protocol handler, as used in Internet Explorer and possibly Firefox, allows remote attackers to obtain sensitive informatio...
How severe is CVE-2007-4960?
CVE-2007-4960 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4960?
Check the references section above for vendor advisories and patch information. Affected products include: Linden Lab Second Life.