Certain versions of Microsoft Internet Explorer (IE) that support double-byte character sets (DBCS) contain a buffer overflow vulnerability in the Type attribute of the OBJECT element. A remote attacker could execute arbitrary code with the privileges of the user running IE.
Microsoft Security Bulletin MS03-032 and SNS Advisory No.68 describe a buffer overflow vulnerability in the Type attribute of the OBJECT element. This vulnerability only affects double-byte character set versions of IE (e.g. Japanese) and may be related to VU#679556/CAN-2003-0344/MS030-020.
By convincing a victim to view an HTML document (web site, HTML email message), a remote attacker could execute arbitrary code with the privileges of the victim.
Apply 822925 or a more recent cumulative patch for IE. See Microsoft Security Bulletin MS03-032.
Vendor| Status| Date Notified| Date Updated
Microsoft Corporation| | 25 Aug 2003| 25 Aug 2003
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Microsoft credits LAC/SNS for reporting this vulnerability. Information used in this document came from LAC/SNS and Microsoft.
This document was written by Art Manion.