Executive Summary
Informations | |||
---|---|---|---|
Name | MS02-027 | First vendor Publication | N/A |
Vendor | Microsoft | Last vendor Modification | N/A |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unchecked Buffer in Gopher Protocol Handler Can Run Code of Attacker's Choice (Q323889) |
OVAL Definitions
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : IE 5.01 5.5 6.0 Cumulative patch (890923) File : nvt/smb_nt_ms02-005.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
3004 | Microsoft IE Gopher Client Overflow Microsoft Internet Explorer contains a flaw in it's built-in Gopher client. The flaw is due to an exploitable buffer overflow when gopher:// URLs are parsed. An attacker can exploit this bug by creating a malicious HTML page with a crafted gopher:// URL that overflows the buffer and injects shell code. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2003-03-02 | Name : The HTTP proxy accepts gopher:// requests. File : proxy_gopher.nasl - Type : ACT_GATHER_INFO |
2002-02-13 | Name : Arbitrary code can be executed on the remote host through the web client. File : smb_nt_ms02-005.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:44:41 |
|