CVE-2005-2829

Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
References
Link Resource
http://marc.info/?l=full-disclosure&m=113450519906463&w=2
http://secunia.com/advisories/15368 Vendor Advisory
http://secunia.com/advisories/18064 Vendor Advisory
http://secunia.com/advisories/18311 Vendor Advisory
http://secunia.com/secunia_research/2005-21/advisory Patch Vendor Advisory
http://secunia.com/secunia_research/2005-7/advisory/ Patch Vendor Advisory
http://securityreason.com/securityalert/254
http://securitytracker.com/id?1015349
http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
http://www.securityfocus.com/archive/1/419395/100/0/threaded
http://www.securityfocus.com/bid/15823 Patch
http://www.vupen.com/english/advisories/2005/2867 Vendor Advisory
http://www.vupen.com/english/advisories/2005/2909 Vendor Advisory
http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-054
https://exchange.xforce.ibmcloud.com/vulnerabilities/23448
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1209
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1340
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1458
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1490
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1505
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1507
http://marc.info/?l=full-disclosure&m=113450519906463&w=2
http://secunia.com/advisories/15368 Vendor Advisory
http://secunia.com/advisories/18064 Vendor Advisory
http://secunia.com/advisories/18311 Vendor Advisory
http://secunia.com/secunia_research/2005-21/advisory Patch Vendor Advisory
http://secunia.com/secunia_research/2005-7/advisory/ Patch Vendor Advisory
http://securityreason.com/securityalert/254
http://securitytracker.com/id?1015349
http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
http://www.securityfocus.com/archive/1/419395/100/0/threaded
http://www.securityfocus.com/bid/15823 Patch
http://www.vupen.com/english/advisories/2005/2867 Vendor Advisory
http://www.vupen.com/english/advisories/2005/2909 Vendor Advisory
http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-054
https://exchange.xforce.ibmcloud.com/vulnerabilities/23448
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1209
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1340
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1458
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1490
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1505
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1507
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://marc.info/?l=full-disclosure&m=113450519906463&w=2 - () http://marc.info/?l=full-disclosure&m=113450519906463&w=2 -
References () http://secunia.com/advisories/15368 - Vendor Advisory () http://secunia.com/advisories/15368 - Vendor Advisory
References () http://secunia.com/advisories/18064 - Vendor Advisory () http://secunia.com/advisories/18064 - Vendor Advisory
References () http://secunia.com/advisories/18311 - Vendor Advisory () http://secunia.com/advisories/18311 - Vendor Advisory
References () http://secunia.com/secunia_research/2005-21/advisory - Patch, Vendor Advisory () http://secunia.com/secunia_research/2005-21/advisory - Patch, Vendor Advisory
References () http://secunia.com/secunia_research/2005-7/advisory/ - Patch, Vendor Advisory () http://secunia.com/secunia_research/2005-7/advisory/ - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/254 - () http://securityreason.com/securityalert/254 -
References () http://securitytracker.com/id?1015349 - () http://securitytracker.com/id?1015349 -
References () http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf - () http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf -
References () http://www.securityfocus.com/archive/1/419395/100/0/threaded - () http://www.securityfocus.com/archive/1/419395/100/0/threaded -
References () http://www.securityfocus.com/bid/15823 - Patch () http://www.securityfocus.com/bid/15823 - Patch
References () http://www.vupen.com/english/advisories/2005/2867 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2867 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2005/2909 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2909 - Vendor Advisory
References () http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420 - () http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-054 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-054 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23448 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23448 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1209 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1209 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1340 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1340 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1458 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1458 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1490 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1490 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1505 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1505 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1507 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1507 -

Information

Published : 2005-12-14 11:03

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2829

Mitre link : CVE-2005-2829

CVE.ORG link : CVE-2005-2829


JSON object : View

Products Affected

microsoft

  • internet_explorer
  • ie