7.5
CVSSv2

CVE-2003-0344

Published: 16/06/2003 Updated: 23/07/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 6.0

microsoft ie 6.0

microsoft internet explorer 5.01

microsoft internet explorer 5.5

Exploits

## # $Id: ms03_020_ie_objecttyperb 10150 2010-08-25 20:55:37Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...
source: wwwsecurityfocuscom/bid/7806/info Microsoft Internet Explorer is prone to a boundary condition error when handling OBJECT tags in web pages When a web page containing an OBJECT tag using a parameter containing excessive data is encountered by a vulnerable client, a internal memory buffer will be overrun This could cause Internet ...
#!/usr/bin/perl # # Proof of concept exploit on IE 5x - 6x by Alumni # IE-Object longtype dynamic call oferflow # # url://<$shellcode><'/'x48><jmp %ptr_sh> # the flaw actually exists in URLMONDLL when converting backslashes # to wide char, this can be seen on stack dump near '&CLSID=AAA2F__2F__' # # To exploi ...