ID CVE-2005-1790
Summary Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
References
Vulnerable Configurations
  • cpe:2.3:a:microsoft:ie:6.0.2800.1106:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0.2800.1106:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0.2900.2180:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0.2900.2180:*:*:*:*:*:*:*
CVSS
Base: 2.6 (as of 19-10-2018 - 15:31)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:N/I:N/A:P
oval via4
  • accepted 2014-02-24T04:00:07.563-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Jeff Cheng
      organization Opsware, Inc.
    • name Jeff Cheng
      organization Opsware, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
    family windows
    id oval:org.mitre.oval:def:1091
    status accepted
    submitted 2005-11-11T12:00:00.000-04:00
    title Server 2003 IE Mismatched Document Object Memory Corruption Vulnerability
    version 70
  • accepted 2014-02-24T04:00:13.361-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Dragos Prisaca
      organization Gideon Technologies, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
    family windows
    id oval:org.mitre.oval:def:1299
    status accepted
    submitted 2005-11-11T12:00:00.000-04:00
    title WinXP,SP2 IE Mismatched Document Object Memory Corruption Vulnerability
    version 71
  • accepted 2014-02-24T04:00:13.568-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
    family windows
    id oval:org.mitre.oval:def:1303
    status accepted
    submitted 2005-11-11T12:00:00.000-04:00
    title WinXP,SP1 (64-bit) IE Mismatched Document Object Memory Corruption Vulnerability
    version 70
  • accepted 2014-02-24T04:00:17.981-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Anna Min
      organization BigFix, Inc
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
    family windows
    id oval:org.mitre.oval:def:1489
    status accepted
    submitted 2005-11-11T12:00:00.000-04:00
    title Win2k,SP4 IE Mismatched Document Object Memory Corruption Vulnerability
    version 70
  • accepted 2014-02-24T04:00:18.888-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Jeff Cheng
      organization Opsware, Inc.
    • name Jeff Cheng
      organization Opsware, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
    family windows
    id oval:org.mitre.oval:def:1508
    status accepted
    submitted 2005-11-11T12:00:00.000-04:00
    title Server 2003,SP1 IE Mismatched Document Object Memory Corruption Vulnerability
    version 71
  • accepted 2014-02-24T04:03:26.143-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
    family windows
    id oval:org.mitre.oval:def:722
    status accepted
    submitted 2005-11-11T12:00:00.000-04:00
    title Win2K/XP,SP1 IE Mismatched Document Object Memory Corruption Vulnerability
    version 70
refmap via4
bid 13799
bugtraq
  • 20050528 Microsoft Internet Explorer - Crash on JavaScript "window()"-calling (05/28/2005)
  • 20050530 Re: Microsoft Internet Explorer - Crash on JavaScript "window()"-calling (05/28/2005)
  • 20051121 Computer Terrorism Security Advisory (Reclassification) - Microsoft Internet Explorer JavaScript Window() Vulnerability
cert TA05-347A
cert-vn VU#887861
confirm http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
misc
ms MS05-054
sectrack 1015251
secunia
  • 15368
  • 15546
  • 18064
  • 18311
vupen
  • ADV-2005-2509
  • ADV-2005-2867
  • ADV-2005-2909
saint via4
bid 13799
description Internet Explorer onload window vulnerability
id win_patch_ie_jsvul
osvdb 17094
title ie_onload_window
type client
Last major update 19-10-2018 - 15:31
Published 01-06-2005 - 04:00
Back to Top