Microsoft Internet Explorer Unspecified GIF And BMP Denial Of Service Vulnerability
2005-06-14T00:00:00
ID SMNTC-13947 Type symantec Reporter Symantec Security Response Modified 2005-06-14T00:00:00
Description
Description
Microsoft Internet Explorer is prone to a denial of service vulnerability when rendering malformed GIF and BMP images. Malformed images for other file formats may also cause a similar condition, though the vendor has not provided any further information. The vendor has not released any further information about this issue other than to state that it is addressed by the Cumulative Security Update For Internet Explorer.
Technologies Affected
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0.1 SP1
Microsoft Internet Explorer 5.0.1 SP2
Microsoft Internet Explorer 5.0.1 SP3
Microsoft Internet Explorer 5.0.1 SP4
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.5 SP1
Microsoft Internet Explorer 5.5 SP2
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 6.0 SP2 do not use
Recommendations
Do not follow links provided by unknown or untrusted sources.
Users should be wary of visiting Web sites of questionable integrity, especially if solicited to do so by an unfamiliar or untrusted source through email or other means.
Microsoft has released a cumulative update for Internet Explorer to address supported versions of the browser. Fixes for Windows 98/SE/ME can be obtained through Windows Update.
{"id": "SMNTC-13947", "type": "symantec", "bulletinFamily": "software", "title": "Microsoft Internet Explorer Unspecified GIF And BMP Denial Of Service Vulnerability", "description": "### Description\n\nMicrosoft Internet Explorer is prone to a denial of service vulnerability when rendering malformed GIF and BMP images. Malformed images for other file formats may also cause a similar condition, though the vendor has not provided any further information. The vendor has not released any further information about this issue other than to state that it is addressed by the Cumulative Security Update For Internet Explorer.\n\n### Technologies Affected\n\n * Microsoft Internet Explorer 5.0.1 \n * Microsoft Internet Explorer 5.0.1 SP1 \n * Microsoft Internet Explorer 5.0.1 SP2 \n * Microsoft Internet Explorer 5.0.1 SP3 \n * Microsoft Internet Explorer 5.0.1 SP4 \n * Microsoft Internet Explorer 5.5 \n * Microsoft Internet Explorer 5.5 SP1 \n * Microsoft Internet Explorer 5.5 SP2 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 SP1 \n * Microsoft Internet Explorer 6.0 SP2 do not use \n\n### Recommendations\n\n**Do not follow links provided by unknown or untrusted sources.** \nUsers should be wary of visiting Web sites of questionable integrity, especially if solicited to do so by an unfamiliar or untrusted source through email or other means.\n\nMicrosoft has released a cumulative update for Internet Explorer to address supported versions of the browser. Fixes for Windows 98/SE/ME can be obtained through Windows Update.\n", "published": "2005-06-14T00:00:00", "modified": "2005-06-14T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/13947", "reporter": "Symantec Security Response", "references": ["http://www.microsoft.com/technet/security/bulletin/MS05-025.mspx"], "cvelist": [], "lastseen": "2018-03-14T00:21:46", "viewCount": 0, "enchantments": {"score": {"value": 0.6, "vector": "NONE", "modified": "2018-03-14T00:21:46", "rev": 2}, "dependencies": {"references": [{"type": "metasploit", "idList": ["MSF:PAYLOAD/LINUX/PPC/METERPRETER_REVERSE_HTTPS", "MSF:POST/LINUX/GATHER/GNOME_KEYRING_DUMP", "MSF:POST/LINUX/GATHER/TOR_HIDDENSERVICES", "MSF:EXPLOIT/MULTI/BROWSER/MSFD_RCE_BROWSER", "MSF:PAYLOAD/LINUX/MIPSBE/METERPRETER_REVERSE_HTTP", "MSF:AUXILIARY/ADMIN/DNS/DYN_DNS_UPDATE", "MSF:POST/LINUX/GATHER/CHECKCONTAINER", "MSF:PAYLOAD/LINUX/AARCH64/SHELL_REVERSE_TCP", "MSF:PAYLOAD/LINUX/PPC64LE/METERPRETER_REVERSE_HTTP", "MSF:AUXILIARY/DOS/SMB/SMB_LORIS"]}], "modified": "2018-03-14T00:21:46", "rev": 2}, "vulnersScore": 0.6}, "affectedSoftware": [{"version": "6.0 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "6.0 SP2 do not use ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.0.1 SP4 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.0.1 SP3 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.0.1 SP1 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.5 SP1 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.5 SP2 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.0.1 SP2 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.0.1 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "5.5 ", "name": "Microsoft Internet Explorer", "operator": "eq"}, {"version": "6.0 SP1 ", "name": "Microsoft Internet Explorer", "operator": "eq"}]}