CVE-2008-4033

N/A Unknown
Published: November 12, 2008 Modified: April 23, 2026
View on NVD

Description

Cross-domain vulnerability in Microsoft XML Core Services 3.0 through 6.0, as used in Microsoft Expression Web, Office, Internet Explorer, and other products, allows remote attackers to obtain sensitive information from another domain and corrupt the session state via HTTP request header fields, as demonstrated by the Transfer-Encoding field, aka "MSXML Header Request Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://securitytracker.com/id?1021164
Source: secure@microsoft.com
http://www.securityfocus.com/bid/32204
Source: secure@microsoft.com
Patch
http://www.us-cert.gov/cas/techalerts/TA08-316A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://marc.info/?l=bugtraq&m=122703006921213&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1021164
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/32204
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.us-cert.gov/cas/techalerts/TA08-316A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/3111
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
62.6%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft