Vulnerability Note VU#334928

Microsoft Internet Explorer contains buffer overflow in Type attribute of OBJECT element on double-byte character set systems

Original Release date: 26 Aug 2003 | Last revised: 11 Aug 2005

Overview

Certain versions of Microsoft Internet Explorer (IE) that support double-byte character sets (DBCS) contain a buffer overflow vulnerability in the Type attribute of the OBJECT element. A remote attacker could execute arbitrary code with the privileges of the user running IE.

Description

Microsoft Security Bulletin MS03-032 and SNS Advisory No.68 describe a buffer overflow vulnerability in the Type attribute of the OBJECT element. This vulnerability only affects double-byte character set versions of IE (e.g. Japanese) and may be related to VU#679556/CAN-2003-0344/MS030-020.

Impact

By convincing a victim to view an HTML document (web site, HTML email message), a remote attacker could execute arbitrary code with the privileges of the victim.

Solution

Apply patch

Apply 822925 or a more recent cumulative patch for IE. See Microsoft Security Bulletin MS03-032.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected25 Aug 200325 Aug 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Microsoft credits LAC/SNS for reporting this vulnerability. Information used in this document came from LAC/SNS and Microsoft.

This document was written by Art Manion.

Other Information

  • CVE IDs: CAN-2003-0701
  • CERT Advisory: CA-2003-22
  • Date Public: 20 Aug 2003
  • Date First Published: 26 Aug 2003
  • Date Last Updated: 11 Aug 2005
  • Severity Metric: 7.09
  • Document Revision: 16

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.