Vulnerabilities > CVE-2003-1041 - Unspecified vulnerability in Microsoft IE and Internet Explorer
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Exploit-Db
description | Microsoft Windows XP/2000 showHelp CHM File Execution Weakness. CVE-2003-1041. Dos exploit for windows platform |
id | EDB-ID:23504 |
last seen | 2016-02-02 |
modified | 2003-12-30 |
published | 2003-12-30 |
reporter | Arman Nayyeri |
source | https://www.exploit-db.com/download/23504/ |
title | Microsoft Windows XP/2000 showHelp CHM File Execution Weakness |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS04-023.NASL |
description | The remote host is subject to two vulnerabilities in the HTML Help and showHelp modules that could allow an attacker to execute arbitrary code on the remote host. To exploit these flaws, an attacker would need to set up a rogue website containing a malicious showHelp URL, and would need to lure a user on the remote host to visit it. Once the user visits the website, a buffer overflow would allow the attacker to execute arbitrary commands with the privileges of the victim user. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 13641 |
published | 2004-07-13 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/13641 |
title | MS04-023: Vulnerability in HTML Help Could Allow Code Execution (840315) |
code |
|
Oval
accepted 2011-05-16T04:00:29.743-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475. family windows id oval:org.mitre.oval:def:1186 status accepted submitted 2004-07-13T12:00:00.000-04:00 title IE .chm Directory Traversal Windows XP Vulnerability version 71 accepted 2007-03-21T16:17:08.910-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation
description Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475. family windows id oval:org.mitre.oval:def:1943 status accepted submitted 2004-07-14T12:00:00.000-04:00 title IE .chm Directory Traversal Windows 2000 Vulnerability version 65 accepted 2007-03-21T16:17:17.120-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation
description Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475. family windows id oval:org.mitre.oval:def:3514 status accepted submitted 2004-07-14T12:00:00.000-04:00 title IE .chm Directory Traversal Windows Server 2003 Vulnerability version 65 accepted 2014-02-24T04:03:28.573-05:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation name Maria Mikhno organization ALTX-SOFT
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475. family windows id oval:org.mitre.oval:def:956 status accepted submitted 2004-07-14T12:00:00.000-04:00 title IE .chm Directory Traversal Windows NT Vulnerability version 75
References
- http://www.securityfocus.com/archive/1/348521
- http://www.securityfocus.com/bid/9320
- http://www.us-cert.gov/cas/techalerts/TA04-196A.html
- http://www.kb.cert.org/vuls/id/187196
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14105
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A956
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3514
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1943
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1186
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023