Executive Summary
Informations | |||
---|---|---|---|
Name | MS03-032 | First vendor Publication | N/A |
Vendor | Microsoft | Last vendor Modification | N/A |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cumulative Patch for Internet Explorer (822925) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:204 | |||
Oval ID: | oval:org.mitre.oval:def:204 | ||
Title: | IE ActiveX Popup Zone Restriction Bypass | ||
Description: | Internet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe). | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2003-0838 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : IE 5.01 5.5 6.0 Cumulative patch (890923) File : nvt/smb_nt_ms02-005.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
15217 | Microsoft IE input Tag Rendering DoS |
7894 | Microsoft IE Object Tag Type Property Double-byte Overflow |
7872 | Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts) Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute arbitary commands on a user's system. The issue is triggered when a user accesses a maliciously crafted HTML page. It is possible that the flaw may allow execution of arbitary commands resulting in a loss of confidentiality, integrity, and/or availability. |
2966 | Microsoft IE BR549.DLL Overflow Microsoft Internet Explorer contains a flaw that may allow an attacker to execute code on a vulnerable system. Due to a buffer overflow in the BR549.DLL ActiveX control, anyone browsing a maclicious HTML page with a vulnerable browser is subject to this flaw. |
2965 | Microsoft IE Cache Script Execution in My Zone Microsoft Internet Explorer contains a flaw that may cause a script to be executed in the "My Computer" zone. If a web browser loads a page with malicious content that abuses the method IE uses to retrieve files from the cache, the content is loaded and run under higher priveleges. This method may also be used to run executable files already present on the system, or view file content. |
2964 | Multiple Browser Object HTA Execution Internet Explorer contains a flaw that fails to validate the nature of the file being loaded for the Object tag. This tag is used to embed all ActiveX into HTML pages, and therefore is susceptible to trojan style attacks via HTML in web pages or e-mail. When exploited, the trojan program will run silently and does not require user interaction. |
2453 | Microsoft IE My Computer Zone Caching Issue |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Windows Scripting Host Shell ActiveX CLSID unicode access RuleID : 8067 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Windows Scripting Host Shell ActiveX clsid access RuleID : 8066 - Revision : 16 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows Reporting Tool ActiveX object access RuleID : 4160 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer popup window object tag code execution attempt RuleID : 15880 - Revision : 10 - Type : BROWSER-IE |
Alert History
Date | Informations |
---|---|
2014-01-19 21:29:49 |
|