5.1
CVSSv2

CVE-2005-1988

Published: 10/08/2005 Updated: 23/07/2021
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 520
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability".

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft ie 6

microsoft internet explorer 5.01

microsoft internet explorer 5.5

Exploits

<!-- placed into html for your testing /str0ke #!/usr/bin/perl ####################################################### # # Internet Explorer COM Objects Instantiation Proof of Concept Exploit (MS05-038) # # Bindshell on port 28876 - Based and ripped from Berend-Jan Wever's IE Exploit # # Vulnerable Objects : # # 3F8A6C33-E0FD-11D0-8A8C-00A0C ...
source: wwwsecurityfocuscom/bid/14282/info Microsoft Internet Explorer is prone to a buffer overflow vulnerability in the JPEG image rendering library used by the browser This issue is due to a failure of the application to properly bounds check input data prior to copying it to a fixed size memory buffer This issue was identified by c ...