CVE-2004-0420

The Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.
References
Link Resource
http://secunia.com/advisories/10736/
http://www.kb.cert.org/vuls/id/106324 US Government Resource
http://www.security-express.com/archives/bugtraq/2004-01/0300.html
http://www.securityfocus.com/archive/1/351379 Exploit Vendor Advisory
http://www.securityfocus.com/bid/9510 Exploit Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA04-196A.html US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024
https://exchange.xforce.ibmcloud.com/vulnerabilities/14964
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2245
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2381
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2894
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3386
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3533
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3604
http://secunia.com/advisories/10736/
http://www.kb.cert.org/vuls/id/106324 US Government Resource
http://www.security-express.com/archives/bugtraq/2004-01/0300.html
http://www.securityfocus.com/archive/1/351379 Exploit Vendor Advisory
http://www.securityfocus.com/bid/9510 Exploit Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA04-196A.html US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024
https://exchange.xforce.ibmcloud.com/vulnerabilities/14964
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2245
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2381
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2894
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3386
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3533
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3604
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://secunia.com/advisories/10736/ - () http://secunia.com/advisories/10736/ -
References () http://www.kb.cert.org/vuls/id/106324 - US Government Resource () http://www.kb.cert.org/vuls/id/106324 - US Government Resource
References () http://www.security-express.com/archives/bugtraq/2004-01/0300.html - () http://www.security-express.com/archives/bugtraq/2004-01/0300.html -
References () http://www.securityfocus.com/archive/1/351379 - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/1/351379 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/9510 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/9510 - Exploit, Vendor Advisory
References () http://www.us-cert.gov/cas/techalerts/TA04-196A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-196A.html - US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/14964 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/14964 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2245 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2245 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2381 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2381 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2894 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2894 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3386 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3386 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3533 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3533 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3604 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3604 -

Information

Published : 2004-07-07 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0420

Mitre link : CVE-2004-0420

CVE.ORG link : CVE-2004-0420


JSON object : View

Products Affected

microsoft

  • internet_explorer
  • ie