Vulnerabilities > CVE-2005-2829 - Unspecified vulnerability in Microsoft IE and Internet Explorer
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-054.NASL |
description | The remote host is missing IE Cumulative Security Update 905915. The remote version of IE is vulnerable to several flaws that could allow an attacker to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20299 |
published | 2005-12-13 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20299 |
title | MS05-054: Cumulative Security Update for Internet Explorer (905915) |
code |
|
Oval
accepted 2014-02-24T04:00:10.650-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability." family windows id oval:org.mitre.oval:def:1209 status accepted submitted 2005-12-13T12:00:00.000-04:00 title Server 2003,SP1 File Download Dialog Box Manipulation Vulnerability version 71 accepted 2014-02-24T04:00:15.287-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability." family windows id oval:org.mitre.oval:def:1340 status accepted submitted 2005-12-13T12:00:00.000-04:00 title WinXP,SP1 (64-bit) File Download Dialog Box Manipulation Vulnerability version 71 accepted 2014-02-24T04:00:17.699-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability." family windows id oval:org.mitre.oval:def:1458 status accepted submitted 2005-12-13T12:00:00.000-04:00 title Server 2003 File Download Dialog Box Manipulation Vulnerability version 70 accepted 2014-02-24T04:00:18.180-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Anna Min organization BigFix, Inc name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability." family windows id oval:org.mitre.oval:def:1490 status accepted submitted 2005-12-13T12:00:00.000-04:00 title Win2K,SP4 File Download Dialog Box Manipulation Vulnerability version 71 accepted 2014-02-24T04:00:18.348-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability." family windows id oval:org.mitre.oval:def:1505 status accepted submitted 2005-12-13T12:00:00.000-04:00 title Win2K/XP,SP1 File Download Dialog Box Manipulation Vulnerability version 71 accepted 2014-02-24T04:00:18.684-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Dragos Prisaca organization Gideon Technologies, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability." family windows id oval:org.mitre.oval:def:1507 status accepted submitted 2005-12-13T12:00:00.000-04:00 title WinXP,SP2 File Download Dialog Box Manipulation Vulnerability version 72
References
- http://secunia.com/secunia_research/2005-21/advisory
- http://secunia.com/secunia_research/2005-7/advisory/
- http://www.securityfocus.com/bid/15823
- http://securitytracker.com/id?1015349
- http://secunia.com/advisories/15368
- http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
- http://secunia.com/advisories/18064
- http://secunia.com/advisories/18311
- http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420
- http://securityreason.com/securityalert/254
- http://www.vupen.com/english/advisories/2005/2909
- http://www.vupen.com/english/advisories/2005/2867
- http://marc.info/?l=full-disclosure&m=113450519906463&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23448
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1507
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1505
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1490
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1458
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1340
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1209
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-054
- http://www.securityfocus.com/archive/1/419395/100/0/threaded