Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=101594127017290&w=2 - | |
References | () http://www.iss.net/security_center/static/8384.php - | |
References | () http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0203&L=ntbugtraq&F=P&S=&P=2404 - | |
References | () http://www.securityfocus.com/bid/4248 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-014 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A147 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18 - |
Information
Published : 2002-03-15 05:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0070
Mitre link : CVE-2002-0070
CVE.ORG link : CVE-2002-0070
JSON object : View
Products Affected
microsoft
- windows_98se
- windows_2000
- windows_nt
- windows_98
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer