Vulnerabilities > CVE-2002-0023 - Unspecified vulnerability in Microsoft Internet Explorer 5.01/5.5/6.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
exploit available
Summary
Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Exploit-Db
description | Microsoft Internet Explorer 5/6 GetObject File Disclosure Vulnerability. CVE-2002-0023. Remote exploit for windows platform |
id | EDB-ID:21195 |
last seen | 2016-02-02 |
modified | 2002-01-01 |
published | 2002-01-01 |
reporter | Georgi Guninski |
source | https://www.exploit-db.com/download/21195/ |
title | Microsoft Internet Explorer 5/6 GetObject File Disclosure Vulnerability |
Oval
accepted 2014-02-24T04:00:22.161-05:00 class vulnerability contributors name David Proulx organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks. family windows id oval:org.mitre.oval:def:17 status accepted submitted 2003-11-12T05:00:00.000-04:00 title IE GetObject Security Bypass version 66 accepted 2014-02-24T04:03:17.744-05:00 class vulnerability contributors name David Proulx organization The MITRE Corporation name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks. family windows id oval:org.mitre.oval:def:40 status accepted submitted 2003-11-12T12:00:00.000-04:00 title IE v5.5,SP2 GetObject File Retrieval version 66 accepted 2014-02-24T04:03:20.775-05:00 class vulnerability contributors name David Proulx organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks. family windows id oval:org.mitre.oval:def:50 status accepted submitted 2003-11-12T12:00:00.000-04:00 title IE v5.01 GetObject File Retrieval version 66 accepted 2014-02-24T04:03:26.783-05:00 class vulnerability contributors name David Proulx organization The MITRE Corporation name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks. family windows id oval:org.mitre.oval:def:77 status accepted submitted 2003-11-12T12:00:00.000-04:00 title IE v5.5 GetObject File Retrieval version 66
References
- http://archives.neohapsis.com/archives/bugtraq/2002-01/0000.html
- http://www.securityfocus.com/bid/3767
- http://www.osvdb.org/3030
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A77
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A50
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A40
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7758
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-005