Race condition in Microsoft Internet Explorer allows user-assisted attackers to overwrite arbitrary files and possibly execute code by tricking a user into performing a drag-and-drop action from certain objects, such as file objects within a folder view, then predicting the drag action, and re-focusing to a malicious window.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.technet.com/msrc/archive/2006/02/13/419439.aspx - | |
References | () http://secunia.com/advisories/18787 - Vendor Advisory | |
References | () http://securitytracker.com/id?1015049 - | |
References | () http://www.osvdb.org/2707 - | |
References | () http://www.securiteam.com/windowsntfocus/5MP0B0UHPA.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/424863/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/424940/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16352 - | |
References | () http://www.vupen.com/english/advisories/2006/0553 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24648 - |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3240
Mitre link : CVE-2005-3240
CVE.ORG link : CVE-2005-3240
JSON object : View
Products Affected
microsoft
- internet_explorer
- ie
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')