Vulnerability Note VU#679556

Microsoft Internet Explorer contains buffer overflow in processing of object types

Original Release date: 04 Jun 2003 | Last revised: 04 Jun 2003


A remotely exploitable vulnerability has been discovered in Internet Explorer. Exploitation of this vulnerability may lead to the execution of arbitrary code.


A remotely exploitable buffer overflow vulnerability has been discovered in Internet Explorer versions 5.1, 5.5 and 6.0. The <object> tag contains a "type" field used to determine how Internet Explorer should treat an object. It is possible to bypass the buffer checks on the input to the "type" field by using a specific character and cause a buffer overflow.

An attacker could create an HTML file that includes a malicious <OBJECT> tag to execute arbitrary code on the victim's machine. When a victim using a vulnerable version of IE, or other applications that use IE as their HTML interpreter, visits the malicious file (via web page, email message, file sharing, etc.), the attacker-supplied code will be executed.


Exploitation of this vulnerability may lead to the execution of arbitrary code with the privileges of the current user.


Microsoft has released MS03-020 to resolve this issue.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-04 Jun 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Microsoft Security and eEye Digital Security for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2003-0344
  • Date Public: 04 Jun 2003
  • Date First Published: 04 Jun 2003
  • Date Last Updated: 04 Jun 2003
  • Severity Metric: 17.47
  • Document Revision: 11


If you have feedback, comments, or additional information about this vulnerability, please send us email.