Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka "MSXML Entity URI Vulnerability."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-033 | vendor advisory |
http://www.securityfocus.com/bid/67895 | vdb entry third party advisory |
http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx | vendor advisory |
http://secunia.com/advisories/58538 | third party advisory permissions required |