Vulnerabilities > CVE-2003-0344 - Unspecified vulnerability in Microsoft IE and Internet Explorer

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
exploit available
metasploit

Summary

Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.

Exploit-Db

  • descriptionMicrosoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability. CVE-2003-0344. Remote exploit for windows platform
    idEDB-ID:22726
    last seen2016-02-02
    modified2003-06-04
    published2003-06-04
    reporterFelineMenace
    sourcehttps://www.exploit-db.com/download/22726/
    titleMicrosoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability
  • descriptionMS Internet Explorer Object Tag Exploit (MS03-020). CVE-2003-0344. Remote exploit for windows platform
    idEDB-ID:37
    last seen2016-01-31
    modified2003-06-07
    published2003-06-07
    reporteralumni
    sourcehttps://www.exploit-db.com/download/37/
    titleMicrosoft Internet Explorer Object Tag Exploit MS03-020
  • descriptionMS03-020 Internet Explorer Object Type. CVE-2003-0344. Remote exploit for windows platform
    idEDB-ID:16581
    last seen2016-02-02
    modified2010-08-25
    published2010-08-25
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16581/
    titleMicrosoft Internet Explorer - Object Type MS03-020

Metasploit

descriptionThis module exploits a vulnerability in Internet Explorer's handling of the OBJECT type attribute.
idMSF:EXPLOIT/WINDOWS/BROWSER/MS03_020_IE_OBJECTTYPE
last seen2020-05-23
modified2017-07-24
published2008-07-01
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0344
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/ms03_020_ie_objecttype.rb
titleMS03-020 Microsoft Internet Explorer Object Type

Oval

accepted2014-02-24T04:03:28.218-05:00
classvulnerability
contributors
  • nameTiffany Bergeron
    organizationThe MITRE Corporation
  • nameHarvey Rubinovitz
    organizationThe MITRE Corporation
  • nameMaria Mikhno
    organizationALTX-SOFT
descriptionBuffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
familywindows
idoval:org.mitre.oval:def:922
statusaccepted
submitted2004-04-29T12:00:00.000-04:00
titleIE Slash Characters in Type Property Vulnerability
version67

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83150/ms03_020_ie_objecttype.rb.txt
idPACKETSTORM:83150
last seen2016-12-05
published2009-11-26
reporterskape
sourcehttps://packetstormsecurity.com/files/83150/MS03-020-Internet-Explorer-Object-Type.html
titleMS03-020 Internet Explorer Object Type

Seebug

bulletinFamilyexploit
description<p对于某些支持双字节编码的语言(例如:日语)的Internet Explorer 6 SP1版本存在缓冲区溢出漏洞。远程攻击者可以借助Object标签的Type属性执行任意代码,该漏洞是CVE-2003-0344的变体。</p><p>CVE-ID:CVE-2003-0701</p><p>CNNVD-ID:CNNVD-200308-125</p><p>漏洞影响范围:</p><p>•Microsoft Internet Explorer 5.01 </p><p>•Microsoft Internet Explorer 5.5 </p><p>•Microsoft Internet Explorer 6.0 </p><p>•Microsoft Internet Explorer 6.0 for Windows Server 2003 </p><p>&nbsp;</p><p>解决方案:</p><p>官方已发布升级补丁,请立即升级到最新版本。</p>
idSSV:13814
last seen2017-11-19
modified2003-08-21
published2003-08-21
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-13814
titleMS Internet Explorer Object Data Remote Exploit (M03-032)