ID CVE-2003-0344
Summary Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
References
Vulnerable Configurations
  • Microsoft Internet Explorer 5.01
    cpe:2.3:a:microsoft:ie:5.01
  • Microsoft ie 5.5
    cpe:2.3:a:microsoft:ie:5.5
  • Microsoft Internet Explorer 6.0
    cpe:2.3:a:microsoft:ie:6.0
  • cpe:2.3:a:microsoft:ie:6.0:-:windows_server_2003
    cpe:2.3:a:microsoft:ie:6.0:-:windows_server_2003
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
  • description MS Internet Explorer Object Tag Exploit (MS03-020). CVE-2003-0344. Remote exploit for windows platform
    id EDB-ID:37
    last seen 2016-01-31
    modified 2003-06-07
    published 2003-06-07
    reporter alumni
    source https://www.exploit-db.com/download/37/
    title Microsoft Internet Explorer Object Tag Exploit MS03-020
  • description Microsoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability. CVE-2003-0344. Remote exploit for windows platform
    id EDB-ID:22726
    last seen 2016-02-02
    modified 2003-06-04
    published 2003-06-04
    reporter FelineMenace
    source https://www.exploit-db.com/download/22726/
    title Microsoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability
  • description MS03-020 Internet Explorer Object Type. CVE-2003-0344. Remote exploit for windows platform
    id EDB-ID:16581
    last seen 2016-02-02
    modified 2010-08-25
    published 2010-08-25
    reporter metasploit
    source https://www.exploit-db.com/download/16581/
    title Microsoft Internet Explorer - Object Type MS03-020
metasploit via4
description This module exploits a vulnerability in Internet Explorer's handling of the OBJECT type attribute.
id MSF:EXPLOIT/WINDOWS/BROWSER/MS03_020_IE_OBJECTTYPE
last seen 2019-03-24
modified 2017-07-24
published 2008-07-01
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb
title MS03-020 Microsoft Internet Explorer Object Type
oval via4
accepted 2014-02-24T04:03:28.218-05:00
class vulnerability
contributors
  • name Tiffany Bergeron
    organization The MITRE Corporation
  • name Harvey Rubinovitz
    organization The MITRE Corporation
  • name Maria Mikhno
    organization ALTX-SOFT
description Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
family windows
id oval:org.mitre.oval:def:922
status accepted
submitted 2004-04-29T12:00:00.000-04:00
title IE Slash Characters in Type Property Vulnerability
version 66
packetstorm via4
data source https://packetstormsecurity.com/files/download/83150/ms03_020_ie_objecttype.rb.txt
id PACKETSTORM:83150
last seen 2016-12-05
published 2009-11-26
reporter skape
source https://packetstormsecurity.com/files/83150/MS03-020-Internet-Explorer-Object-Type.html
title MS03-020 Internet Explorer Object Type
refmap via4
bugtraq 20030604 Internet Explorer Object Type Property Overflow
cert-vn VU#679556
eeye AD20030604
fulldisc 20030709 IE Object Type Overflow Exploit
ms MS03-020
secunia 8943
Last major update 17-10-2016 - 22:32
Published 16-06-2003 - 00:00
Last modified 12-10-2018 - 17:32
Back to Top