Vulnerabilities > CVE-2003-0344 - Unspecified vulnerability in Microsoft IE and Internet Explorer
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Exploit-Db
description Microsoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability. CVE-2003-0344. Remote exploit for windows platform id EDB-ID:22726 last seen 2016-02-02 modified 2003-06-04 published 2003-06-04 reporter FelineMenace source https://www.exploit-db.com/download/22726/ title Microsoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability description MS Internet Explorer Object Tag Exploit (MS03-020). CVE-2003-0344. Remote exploit for windows platform id EDB-ID:37 last seen 2016-01-31 modified 2003-06-07 published 2003-06-07 reporter alumni source https://www.exploit-db.com/download/37/ title Microsoft Internet Explorer Object Tag Exploit MS03-020 description MS03-020 Internet Explorer Object Type. CVE-2003-0344. Remote exploit for windows platform id EDB-ID:16581 last seen 2016-02-02 modified 2010-08-25 published 2010-08-25 reporter metasploit source https://www.exploit-db.com/download/16581/ title Microsoft Internet Explorer - Object Type MS03-020
Metasploit
description | This module exploits a vulnerability in Internet Explorer's handling of the OBJECT type attribute. |
id | MSF:EXPLOIT/WINDOWS/BROWSER/MS03_020_IE_OBJECTTYPE |
last seen | 2020-05-23 |
modified | 2017-07-24 |
published | 2008-07-01 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0344 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/ms03_020_ie_objecttype.rb |
title | MS03-020 Microsoft Internet Explorer Object Type |
Oval
accepted | 2014-02-24T04:03:28.218-05:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:922 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2004-04-29T12:00:00.000-04:00 | ||||||||||||
title | IE Slash Characters in Type Property Vulnerability | ||||||||||||
version | 67 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/83150/ms03_020_ie_objecttype.rb.txt |
id | PACKETSTORM:83150 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | skape |
source | https://packetstormsecurity.com/files/83150/MS03-020-Internet-Explorer-Object-Type.html |
title | MS03-020 Internet Explorer Object Type |
Seebug
bulletinFamily | exploit |
description | <p对于某些支持双字节编码的语言(例如:日语)的Internet Explorer 6 SP1版本存在缓冲区溢出漏洞。远程攻击者可以借助Object标签的Type属性执行任意代码,该漏洞是CVE-2003-0344的变体。</p><p>CVE-ID:CVE-2003-0701</p><p>CNNVD-ID:CNNVD-200308-125</p><p>漏洞影响范围:</p><p>•Microsoft Internet Explorer 5.01 </p><p>•Microsoft Internet Explorer 5.5 </p><p>•Microsoft Internet Explorer 6.0 </p><p>•Microsoft Internet Explorer 6.0 for Windows Server 2003 </p><p> </p><p>解决方案:</p><p>官方已发布升级补丁,请立即升级到最新版本。</p> |
id | SSV:13814 |
last seen | 2017-11-19 |
modified | 2003-08-21 |
published | 2003-08-21 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-13814 |
title | MS Internet Explorer Object Data Remote Exploit (M03-032) |
References
- http://www.eeye.com/html/Research/Advisories/AD20030604.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006401.html
- http://www.kb.cert.org/vuls/id/679556
- http://secunia.com/advisories/8943
- http://marc.info/?l=bugtraq&m=105476381609135&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A922
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-020