Internet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe).
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009639.html - | |
References | () http://marc.info/?l=bugtraq&m=106304733121753&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=106304876523459&w=2 - | |
References | () http://marc.info/?l=ntbugtraq&m=106302799428500&w=2 - | |
References | () http://securityresponse.symantec.com/avcenter/venc/data/trojan.qhosts.html - | |
References | () http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0310&L=ntbugtraq&F=P&S=&P=2169 - | |
References | () http://www.osvdb.org/7872 - | |
References | () http://www.securityfocus.com/bid/8556 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-040 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/13314 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A204 - |
Information
Published : 2003-11-17 05:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0838
Mitre link : CVE-2003-0838
CVE.ORG link : CVE-2003-0838
JSON object : View
Products Affected
microsoft
- internet_explorer
- ie
CWE